Tag Archives: Jeong Hyun Yi)

Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) (by Kyung-Hyune Rhee, Jeong Hyun Yi)


Author(s): Kyung-Hyune Rhee, Jeong Hyun Yi

Publisher: Springer
Publish date: 2015-01-22
ISBN-10: 3319150863
ISBN-13: 9783319150864
Language: English
Description: This book constitutes the thoroughly refereed proceedings of the
15th International Workshop on Information Security Applications,
WISA 2014, held on Jeju Island, Korea, in August 2014. The 30
revised full papers presented in this volume were carefully
reviewed and selected from 69 submissions. The papers are organized
in topical sections such as malware detection; mobile security;
vulnerability analysis; applied cryptography; network security;
cryptography; hardware security; and critical infrastructure
security and policy.

Read Source: Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) (by Kyung-Hyune Rhee, Jeong Hyun Yi)»

Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) (by Kyung-Hyune Rhee, Jeong Hyun Yi)


Author(s): Kyung-Hyune Rhee, Jeong Hyun Yi

Publisher: Springer
Publish date: 2015-01-22
ISBN-10: 3319150863
ISBN-13: 9783319150864
Language: English
Description: This book constitutes the thoroughly refereed proceedings of the
15th International Workshop on Information Security Applications,
WISA 2014, held on Jeju Island, Korea, in August 2014. The 30
revised full papers presented in this volume were carefully
reviewed and selected from 69 submissions. The papers are organized
in topical sections such as malware detection; mobile security;
vulnerability analysis; applied cryptography; network security;
cryptography; hardware security; and critical infrastructure
security and policy.

Read Source: Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) (by Kyung-Hyune Rhee, Jeong Hyun Yi)»