Normal view MARC view ISBD view

Information Security Applications [electronic resource] : 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers / edited by Ilsun You, Taek-Young Youn.

Contributor(s): You, Ilsun [editor.] | Youn, Taek-Young [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 13720Publisher: Cham : Springer Nature Switzerland : Imprint: Springer, 2023Edition: 1st ed. 2023.Description: XIII, 358 p. 95 illus., 61 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031256592.Subject(s): Data protection | Computer engineering | Computer networks  | Application software | Computer networks -- Security measures | Data and Information Security | Computer Engineering and Networks | Computer and Information Systems Applications | Mobile and Network SecurityAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the revised selected papers from the 23rd International Conference on Information Security Applications, WISA 2022, which took place on Jeju Island, South Korea, during August 2022. The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: network security; cryptography; vulnerability analysis; privacy enhancing technique; security management; security engineering.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the revised selected papers from the 23rd International Conference on Information Security Applications, WISA 2022, which took place on Jeju Island, South Korea, during August 2022. The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: network security; cryptography; vulnerability analysis; privacy enhancing technique; security management; security engineering.

There are no comments for this item.

Log in to your account to post a comment.