Tag Archives: Korea

Information Security and Cryptology – ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) (by Dong Hoon Lee, Jong In Lim)


Author(s): Dong Hoon Lee, Jong In Lim

Publisher: Springer
Publish date: 2004-05-14
ISBN-10: 3540213767
ISBN-13: 9783540213765
Language: English
Description:
This book constitutes the thoroughly refereed post-proceedings of
the 6th International Conference on Information Security and
Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.

The 32 revised full papers presented together with an invited
paper were carefully selected from 163 submissions during two
rounds of reviewing and improvement. The papers are organized in
topical sections on digital signatures, primitives, fast
implementations, computer security and mobile security, voting
and auction protocols, watermarking, authentication and threshold
protocols, and block ciphers and stream ciphers.

Read Source: Information Security and Cryptology – ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) (by Dong Hoon Lee, Jong In Lim)»

Information Security and Cryptology – ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) (by Dong Hoon Lee, Jong In Lim)


Author(s): Dong Hoon Lee, Jong In Lim

Publisher: Springer
Publish date: 2004-05-14
ISBN-10: 3540213767
ISBN-13: 9783540213765
Language: English
Description:
This book constitutes the thoroughly refereed post-proceedings of
the 6th International Conference on Information Security and
Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003.

The 32 revised full papers presented together with an invited
paper were carefully selected from 163 submissions during two
rounds of reviewing and improvement. The papers are organized in
topical sections on digital signatures, primitives, fast
implementations, computer security and mobile security, voting
and auction protocols, watermarking, authentication and threshold
protocols, and block ciphers and stream ciphers.

Read Source: Information Security and Cryptology – ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science) (by Dong Hoon Lee, Jong In Lim)»

Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers (Lecture Notes in Computer Science) (by Ingemar J. Cox, Ton Kalker, Yong M. Ro)


Author(s): Ingemar J. Cox, Ton Kalker, Yong M. Ro

Publisher: Springer
Publish date: 2004-02-24
ISBN-10: 354021061X
ISBN-13: 9783540210610
Language: English
Description: We are happy to present to you the proceedings of the 2nd
International Workshop on Digital Watermarking, IWDW 2003. Since
its modern re-appearance in the academic community in the early
1990s, great progress has been made in understanding both the
capabilities and the weaknesses of digital watermarking. On the
theoretical side, we all are now well aware of the fact that
digital waterma- ing is best viewed as a form of communication
using side information. In the case of digital watermarking the
side information in question is the document to be wat- marked.
This insight has led to a better understanding of the limits of the
capacity and robustness… more…

Read Source: Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers (Lecture Notes in Computer Science) (by Ingemar J. Cox, Ton Kalker, Yong M. Ro)»

Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers (Lecture Notes in Computer Science) (by Ingemar J. Cox, Ton Kalker, Yong M. Ro)


Author(s): Ingemar J. Cox, Ton Kalker, Yong M. Ro

Publisher: Springer
Publish date: 2004-02-24
ISBN-10: 354021061X
ISBN-13: 9783540210610
Language: English
Description: We are happy to present to you the proceedings of the 2nd
International Workshop on Digital Watermarking, IWDW 2003. Since
its modern re-appearance in the academic community in the early
1990s, great progress has been made in understanding both the
capabilities and the weaknesses of digital watermarking. On the
theoretical side, we all are now well aware of the fact that
digital waterma- ing is best viewed as a form of communication
using side information. In the case of digital watermarking the
side information in question is the document to be wat- marked.
This insight has led to a better understanding of the limits of the
capacity and robustness… more…

Read Source: Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003, Revised Papers (Lecture Notes in Computer Science) (by Ingemar J. Cox, Ton Kalker, Yong M. Ro)»

Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) (by Kyung-Hyune Rhee, Jeong Hyun Yi)


Author(s): Kyung-Hyune Rhee, Jeong Hyun Yi

Publisher: Springer
Publish date: 2015-01-22
ISBN-10: 3319150863
ISBN-13: 9783319150864
Language: English
Description: This book constitutes the thoroughly refereed proceedings of the
15th International Workshop on Information Security Applications,
WISA 2014, held on Jeju Island, Korea, in August 2014. The 30
revised full papers presented in this volume were carefully
reviewed and selected from 69 submissions. The papers are organized
in topical sections such as malware detection; mobile security;
vulnerability analysis; applied cryptography; network security;
cryptography; hardware security; and critical infrastructure
security and policy.

Read Source: Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) (by Kyung-Hyune Rhee, Jeong Hyun Yi)»

Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) (by Kyung-Hyune Rhee, Jeong Hyun Yi)


Author(s): Kyung-Hyune Rhee, Jeong Hyun Yi

Publisher: Springer
Publish date: 2015-01-22
ISBN-10: 3319150863
ISBN-13: 9783319150864
Language: English
Description: This book constitutes the thoroughly refereed proceedings of the
15th International Workshop on Information Security Applications,
WISA 2014, held on Jeju Island, Korea, in August 2014. The 30
revised full papers presented in this volume were carefully
reviewed and selected from 69 submissions. The papers are organized
in topical sections such as malware detection; mobile security;
vulnerability analysis; applied cryptography; network security;
cryptography; hardware security; and critical infrastructure
security and policy.

Read Source: Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers (Lecture Notes in Computer Science / Security and Cryptology) (by Kyung-Hyune Rhee, Jeong Hyun Yi)»