LEADER 05119nam 22008415 450 001 996465559803316 005 20200702041658.0 010 $a1-280-38306-2 010 $a9786613560971 010 $a3-642-02617-6 024 7 $a10.1007/978-3-642-02617-1 035 $a(CKB)1000000000753948 035 $a(SSID)ssj0000315995 035 $a(PQKBManifestationID)11229634 035 $a(PQKBTitleCode)TC0000315995 035 $a(PQKBWorkID)10255678 035 $a(PQKB)10274736 035 $a(DE-He213)978-3-642-02617-1 035 $a(MiAaPQ)EBC3064306 035 $a(PPN)136306985 035 $a(EXLCZ)991000000000753948 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Information Security and Assurance$b[electronic resource] $eThird International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings /$fedited by James (Jong Hyuk) Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Sang-Soo Yeo 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XXXII, 841 p.) 225 1 $aSecurity and Cryptology ;$v5576 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-02616-8 320 $aIncludes bibliographical references and index. 327 $aCryptographic Algorithms -- Authentication and Identity Management -- Authorization and Access Control -- Biometrics and Computer Forensics -- Cryptographic Protocols -- Data Integrity and Privacy -- Key Management and Recovery -- Mobile and RFID Network Security -- Firewall, IDS, Anti-virus, and Other Security Products -- Internet and Web Services Security -- Cyber-attack and Cyber-terrorism -- Other Security Research -- MoWiN 2009 -- NASSUE 2009 -- IAWSN 2009 -- WNGS 2009 and CGMS 2009 -- SHCI-ISA 2009. 330 $aThis book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009. The 41 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on cryptographic algorithms, authentication and identity management, authorization and access control, biometrics and computer forensics, cryptographic protocols, data integrity and privacy, key management and recovery, mobile and RFID network security, firewall, IDs, anti-virus, and other security products, internet and web services security, cyber-attack and cyber-terrorism, other security research, together with the articles from the workshops MoWiN 2009, NASSUE 2009, IAWSN 2009, WNGS 2009 & CGMS 2009, SHCI-ISA 2009. 410 0$aSecurity and Cryptology ;$v5576 606 $aComputer communication systems 606 $aComputer security 606 $aComputer organization 606 $aData structures (Computer science) 606 $aData encryption (Computer science) 606 $aComputer system failures 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aComputer organization. 615 0$aData structures (Computer science). 615 0$aData encryption (Computer science). 615 0$aComputer system failures. 615 14$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aData Structures and Information Theory. 615 24$aCryptology. 615 24$aSystem Performance and Evaluation. 676 $a004 702 $aPark$b James (Jong Hyuk)$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChen$b Hsiao-Hwa$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAtiquzzaman$b Mohammed$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLee$b Changhoon$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYeo$b Sang-Soo$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference on Information Security and Assurance 906 $aBOOK 912 $a996465559803316 996 $aAdvances in Information Security and Assurance$9774211 997 $aUNISA