Information Security Applications
indgår i Security and Cryptology serien
- Indbinding:
- Paperback
- Sideantal:
- 404
- Udgivet:
- 11. januar 2008
- Størrelse:
- 155x22x235 mm.
- Vægt:
- 610 g.
- 8-11 hverdage.
- 10. december 2024
På lager
Forlænget returret til d. 31. januar 2025
Normalpris
Abonnementspris
- Rabat på køb af fysiske bøger
- 1 valgfrit digitalt ugeblad
- 20 timers lytning og læsning
- Adgang til 70.000+ titler
- Ingen binding
Abonnementet koster 75 kr./md.
Ingen binding og kan opsiges når som helst.
- 1 valgfrit digitalt ugeblad
- 20 timers lytning og læsning
- Adgang til 70.000+ titler
- Ingen binding
Abonnementet koster 75 kr./md.
Ingen binding og kan opsiges når som helst.
Beskrivelse af Information Security Applications
The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27¿29, 2007. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We were very pleased and honored to serve as the Program Committee Co-chairs of WISA 2007. The Program Committee received 95 papers from 20 countries, and accepted 27 papers for the full presentation track. The papers were selected after an extensive and careful refereeing process in which each paper was reviewed by at least three members of the Program Committee. In addition to the contributed papers, the workshop had three special talks. Moti Yung gave a tutorial talk, entitled ¿Somebody You Know: The Fourth Factor of Authentication.¿ Kihong Park and Nasir Memon gave invited talks, entitled ¿Reactive Zero-Day Attack Protection¿ and ¿Securing Biometric T- plates,¿ respectively. Many people deserve our gratitude for their generous contributions to the success of the workshop. We would like to thank all the people involved in the technical program and in organizing the workshop. We are very grateful to the ProgramCommitteemembersandtheexternalrefereesfortheir timeande?orts in reviewing the submissions and selecting the accepted papers. We also express our special thanks to the Organizing Committee members for their hard work in organizing the workshop.
Brugerbedømmelser af Information Security Applications
Giv din bedømmelse
For at bedømme denne bog, skal du være logget ind.Andre købte også..
Find lignende bøger
Bogen Information Security Applications findes i følgende kategorier:
- Business og læring > Computer og IT
- Hobby og fritid
- Litteratur og litteraturstudier
- Reference, information og tværfaglige emner > Forskning og information: generelt > Kodeteori og kryptologi
- Økonomi, finans, erhvervsliv og ledelse > Erhvervsliv, virksomheder og ledelse > Matematik for virksomhedsøkonomer og forretningssystemer
- Idræt og udendørsaktiviteter
- Databehandling og informationsteknologi > Computere og hardware > Netværkskomponenter
- Databehandling og informationsteknologi > Programmering / softwareudvikling > Algoritmer og datastrukturer
- Databehandling og informationsteknologi > Datasikkerhed > Datakryptering
- Databehandling og informationsteknologi > Datakommunikation og computernetværk > Netværkssikkerhed
- Databehandling og informationsteknologi > Informatik > Kunstig intelligens > Ekspertsystemer og vidensbaserede systemer
© 2024 Pling BØGER Registered company number: DK43351621