Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13720)
Included in the following conference series:
Conference proceedings info: WISA 2022.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (25 papers)
-
Network Security
-
Vulnerability Analysis
Other volumes
-
Information Security Applications
Keywords
- authentication
- computer crime
- computer hardware
- computer networks
- computer science
- computer security
- computer systems
- cryptography
- data security
- engineering
- internet
- mathematics
- network protocols
- network security
- signal processing
- software architecture
- software design
- software engineering
- telecommunication networks
- telecommunication systems
About this book
The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: network security; cryptography; vulnerability analysis; privacy enhancing technique; security management; security engineering.
Editors and Affiliations
Bibliographic Information
Book Title: Information Security Applications
Book Subtitle: 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24–26, 2022, Revised Selected Papers
Editors: Ilsun You, Taek-Young Youn
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-25659-2
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2023
Softcover ISBN: 978-3-031-25658-5Published: 04 February 2023
eBook ISBN: 978-3-031-25659-2Published: 03 February 2023
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 358
Number of Illustrations: 34 b/w illustrations, 61 illustrations in colour
Topics: Systems and Data Security, Computer Systems Organization and Communication Networks, Information Systems Applications (incl. Internet), Mobile and Network Security