LEADER 02857nam 22006135 450 001 996203275703316 005 20200630152851.0 010 $a3-319-05149-0 024 7 $a10.1007/978-3-319-05149-9 035 $a(CKB)3710000000095006 035 $a(DE-He213)978-3-319-05149-9 035 $a(SSID)ssj0001187248 035 $a(PQKBManifestationID)11697455 035 $a(PQKBTitleCode)TC0001187248 035 $a(PQKBWorkID)11256869 035 $a(PQKB)11770636 035 $a(MiAaPQ)EBC3101223 035 $a(PPN)177824476 035 $a(EXLCZ)993710000000095006 100 $a20140307d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Applications$b[electronic resource] $e14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers /$fedited by Yongdae Kim, Heejo Lee, Adrian Perrig 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 273 p. 79 illus.) 225 1 $aSecurity and Cryptology ;$v8267 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-05148-2 327 $aCryptography -- Social network security -- Mobile security -- Network security -- Future applications -- Privacy. 330 $aThis book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy. 410 0$aSecurity and Cryptology ;$v8267 606 $aComputer security 606 $aData encryption (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 14$aSystems and Data Security. 615 24$aCryptology. 676 $a005.8 702 $aKim$b Yongdae$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLee$b Heejo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPerrig$b Adrian$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996203275703316 996 $aInformation Security Applications$9771979 997 $aUNISA