Skip to main content

Information Security Applications

7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers

  • Conference proceedings
  • © 2007

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4298)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: WISA 2006.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (30 papers)

  1. DRM/Information Hiding/Ubiquitous Computing Security/P2P Security

  2. Privacy/Anonymity

  3. Internet and Wireless Security

Other volumes

  1. Information Security Applications

Keywords

Bibliographic Information

Publish with us