Information security applications : 9th International workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008 : revised selected papers
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International workshop on information security applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008. The 24 revised full papers presented were carefully reviewed and selected from a tota...
Uloženo v:
Další autoři: | |
---|---|
Korporace: | |
Konference: | |
Médium: | E-kniha |
Jazyk: | angličtina |
Vydáno: |
Berlin ; Heidelberg ; New York :
Springer,
2009
|
Edice: | Lecture notes in computer science
|
Žánr/forma: | elektronické knihy sborníky konferencí |
ISBN: | 978-3-642-00306-6 978-3-642-00305-9 3-642-00305-2 |
Témata: | |
On-line přístup: | Plný text |
Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
|
LEADER | 03125cam a2200625 i 4500 | ||
---|---|---|---|
001 | 001819042 | ||
003 | CZ PrSTK | ||
005 | 20231106140632.0 | ||
006 | m f d | ||
007 | cr nn 008mamaa | ||
008 | 100301t20092009gw fs 101 0 eng d | ||
020 | |a 978-3-642-00306-6 |q (elektronická kniha) | ||
020 | |z 978-3-642-00305-9 |q (brožováno) |z 3-642-00305-2 | ||
024 | 7 | |a 10.1007/978-3-642-00306-6 |2 doi | |
040 | |a DE-He213 |b cze |d ABA013 |e rda | ||
044 | |a gw |a xxu | ||
072 | 7 | |a 004 |x Počítačová věda. Výpočetní technika. Informační technologie |2 Konspekt |9 23 | |
080 | |a 003.26 |2 MRF | ||
080 | |a 004 |2 MRF | ||
080 | |a 004.056 |2 MRF | ||
080 | |a 004.056.55 |2 MRF | ||
080 | |a 004.38 |2 MRF | ||
080 | |a 004.421 |2 MRF | ||
080 | |a [007+004]:658 |2 MRF | ||
080 | |a (0.034.2:08) |2 MRF | ||
080 | |a (062.534) |2 MRF | ||
111 | 2 | |a WISA 2008 |c (Čedžu, Korea) | |
245 | 1 | 0 | |a Information security applications : |b 9th International workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008 : revised selected papers / |c Kyo-Il Chung, Kiwook Sohn, Moti Yung (eds.) |
264 | 1 | |a Berlin ; |a Heidelberg ; |a New York : |b Springer, |c [2009] | |
264 | 4 | |c ©2009 | |
300 | |a 1 online zdroj (XI, 334 stran) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science, |x 0302-9743 ; |v 5379 | |
504 | |a Obsahuje bibliografie a rejstřík | ||
520 | |a This book constitutes the thoroughly refereed post-conference proceedings of the 9th International workshop on information security applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008. The 24 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on smart card and secure hardware, wireless and sensor network security, public key crypto applications, privacy and anonymity, n/w security and intrusion detection, as well as application security and trust management. | ||
650 | 0 | 7 | |a kryptografie |x if |7 psh6600 |2 psh |
650 | 0 | 7 | |a informatika |x if |7 psh6548 |2 psh |
650 | 0 | 7 | |a počítačová bezpečnost |x vt |7 psh12336 |2 psh |
650 | 0 | 7 | |a šifrování dat |x vt |7 psh12353 |2 psh |
650 | 0 | 7 | |a počítače |x vt |7 psh12315 |2 psh |
650 | 0 | 7 | |a algoritmizace |x vt |7 psh12472 |2 psh |
650 | 0 | 7 | |a podnikové informační systémy |x ev |7 psh13633 |2 psh |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 7 | |a sborníky konferencí |7 fd133333 |2 czenas | |
700 | 1 | |a Chung, Kyo-Il |4 edt | |
700 | 1 | |a Sohn, Kiwook |4 edt | |
700 | 1 | |a Yung, Moti, |d 1959- |7 xx0032875 |4 edt | |
710 | 2 | |a SpringerLink (online služba) |7 ntk2018999494 |4 dst | |
776 | 0 | 8 | |i Tištěné vydání: |t Information security applications : 9th International workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008 : revised selected papers |z 978-3-642-00305-9 |
830 | 0 | |a Lecture notes in computer science | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-00306-6 |y Plný text |
910 | |a ABA013 | ||
950 | |a Springer |b Lecture Notes in Computer Science 2017 |