Skip to main content

Information Security Applications

11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers

  • Conference proceedings
  • © 2011

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6513)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: WISA 2010.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (25 papers)

  1. Cryptosystem

  2. Implementation

  3. Mobile Security/Secure Coding

  4. Attack

Other volumes

  1. Information Security Applications

Keywords

About this book

This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010. The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.

Editors and Affiliations

  • Department of Computer and Information Science, Korea University, Chungnam-do, Korea

    Yongwha Chung

  • Computer Science Department, Google Inc. and Columbia University, NewYork, USA

    Moti Yung

Bibliographic Information

Publish with us