Computer Security Applications, 11th Annual Conference
Author : Computer Security Applications Conference
Publisher :
Page : 300 pages
File Size : 25,30 MB
Release : 1995
Category : Computers
ISBN :
Author : Computer Security Applications Conference
Publisher :
Page : 300 pages
File Size : 25,30 MB
Release : 1995
Category : Computers
ISBN :
Author :
Publisher :
Page : 316 pages
File Size : 26,31 MB
Release : 1993
Category : Computer security
ISBN :
Author : Hyoungshick Kim
Publisher : Springer Nature
Page : 296 pages
File Size : 49,25 MB
Release : 2021-10-26
Category : Computers
ISBN : 3030894320
This book constitutes the revised selected papers from the 22nd International Conference on Information Security Applications, WISA 2021, which took place on Jeju Island, South Korea, during August 2021. The 23 papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: machine learning security; cryptography; hardware security; and application security.
Author : Chae Hoon Lim
Publisher : Springer
Page : 482 pages
File Size : 28,12 MB
Release : 2005-02-10
Category : Computers
ISBN : 3540318151
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications from the academic community as well as from the industry. The workshop program covers a wide range of security aspects including cryptography, cryptanalysis, network/system security and implementation aspects. The programcommittee received169 papersfrom 22 countries,andaccepted 37 papers for a full presentation track and 30 papers for a short presentation track. Each paper was carefully evaluated through peer-review by at least three members of the programcommittee. This volume contains revised versions of 36 papers accepted and presented in the full presentation track. Short papers were only published in the WISA 2004 pre-proceedings as preliminary versions and are allowed to be published elsewhere as extended versions. In addition to the contributed papers, Professors Gene Tsudik and Ross Andersongaveinvitedtalks,entitledSecurityinOutsourcedDatabasesandWhat does ‘Security’ mean for Ubiquitous Applications?, respectively.
Author : Jae-Kwang Lee
Publisher : Springer Science & Business Media
Page : 418 pages
File Size : 27,87 MB
Release : 2007-03-30
Category : Business & Economics
ISBN : 3540710922
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006. Coverage in the 30 revised full papers includes public key crypto applications and virus protection, cyber indication and intrusion detection, biometrics and security trust management, secure software and systems, smart cards and secure hardware, and mobile security.
Author : Ilsun You
Publisher : Springer Nature
Page : 387 pages
File Size : 35,49 MB
Release : 2020-01-24
Category : Computers
ISBN : 3030393038
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019. The 29 revised full papers presented in this volume were carefully reviewed and selected from 63 submissions. The primary focus of WISA 2019 was on systems and network security including all other technical and practical aspects of security application in general. The papers are grouped in the following topical sections: Application and Game Security; Network Security and Blockchain; Cryptography; Security with AI and Machine Learning; IoT Security; Hardware Security; and Selected Security Issues.
Author : Matthew A. Bishop
Publisher : Addison-Wesley Professional
Page : 1144 pages
File Size : 26,40 MB
Release : 2003
Category : Computers
ISBN : 9780201440997
The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. Comprehensive in scope, this book covers applied and practical elements, theory, and the reasons for the design of applications and security techniques.
Author : Taekyoung Kwon
Publisher : Taylor & Francis
Page : 396 pages
File Size : 26,31 MB
Release : 2006-02-10
Category : Business & Economics
ISBN : 9783540310129
This book constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, WISA 2005, held in Jeju Island, Korea, in August 2005. The 29 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 168 submissions. The papers are organized in topical sections on security analysis and attacks, systems security, network security, DRM/software security, efficient HW implementation, side-channel attacks, privacy/anonymity, and efficient implementation.
Author :
Publisher :
Page : 332 pages
File Size : 34,44 MB
Release : 1994
Category : Computers
ISBN :
Presents the proceedings of the 1994 conference. Topics include distributed security, security for electronic commerce/electronic data interchange, secure DBMS, Internet security, firewalls, security engineering, and CMWs on the desktop. No index. Annotation copyright Book News, Inc. Portland, Or.
Author : Michel Dupuy
Publisher : Springer
Page : 484 pages
File Size : 42,23 MB
Release : 2008-11-16
Category : Business & Economics
ISBN : 0306469987
Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec’01 is the first of this decade (and century) and it will be devoted to “Trusted Information - the New Decade Challenge” This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Protocols, Smart Card, Network Security and Intrusion Detection, Trusted Platforms. Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management. The year 2001 is a double anniversary. First, fifteen years ago, the first IFIP/Sec was held in France (IFIP/Sec’86, Monte-Carlo) and 2001 is also the anniversary of smart card technology. Smart cards emerged some twenty years ago as an innovation and have now become pervasive information devices used for highly distributed secure applications. These cards let millions of people carry a highly secure device that can represent them on a variety of networks. To conclude, we hope that the rich “menu” of conference papers for this IFIP/Sec conference will provide valuable insights and encourage specialists to pursue their work in trusted information.