Coverart for item
The Resource Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers, Chae Hoon Lim, Moti Yung (eds.)

Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers, Chae Hoon Lim, Moti Yung (eds.)

Label
Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers
Title
Information security applications
Title remainder
5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers
Statement of responsibility
Chae Hoon Lim, Moti Yung (eds.)
Title variation
WISA 2004
Creator
Contributor
Subject
Genre
Language
eng
Summary
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications from the academic community as well as from the industry. The workshop program covers a wide range of security aspects including cryptography, cryptanalysis, network/system security and implementation aspects. The programcommittee received169 papersfrom 22 countries, andaccepted 37 papers for a full presentation track and 30 papers for a short presentation track. Each paper was carefully evaluated through peer-review by at least three members of the programcommittee. This volume contains revised versions of 36 papers accepted and presented in the full presentation track. Short papers were only published in the WISA 2004 pre-proceedings as preliminary versions and are allowed to be published elsewhere as extended versions. In addition to the contributed papers, Professors Gene Tsudik and Ross Andersongaveinvitedtalks, entitledSecurityinOutsourcedDatabasesandWhat does 'Security' mean for Ubiquitous Applications?, respectively
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
W577 2004eb
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2004
http://bibfra.me/vocab/lite/meetingName
WISA (Workshop : Information security)
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Lim, Chae Hoon
  • Yung, Moti
Series statement
Lecture notes in computer science,
Series volume
3325
http://library.link/vocab/subjectName
  • Computer security
  • Data protection
  • Informatique
  • Computer security
  • Data protection
  • Sécurité informatique
  • Coopération internationale
  • Sécurité des données
Label
Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers, Chae Hoon Lim, Moti Yung (eds.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Network/computer security -- Public key schemes -- Intrusion detection -- Watermarking/anti-spamming -- Digital rights management -- e-commerce security -- Efficient implementation -- Anonymous communication -- Side-channel attacks
Control code
262680692
Dimensions
unknown
Extent
1 online resource (xii, 472 pages)
Form of item
online
Isbn
9783540240150
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
9783540240150
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-24015-0
Specific material designation
remote
System control number
(OCoLC)262680692
Label
Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers, Chae Hoon Lim, Moti Yung (eds.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Network/computer security -- Public key schemes -- Intrusion detection -- Watermarking/anti-spamming -- Digital rights management -- e-commerce security -- Efficient implementation -- Anonymous communication -- Side-channel attacks
Control code
262680692
Dimensions
unknown
Extent
1 online resource (xii, 472 pages)
Form of item
online
Isbn
9783540240150
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
9783540240150
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-24015-0
Specific material designation
remote
System control number
(OCoLC)262680692

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...