This book constitutes the refereed proceedings of the Third International Conference on Advances in Information Security and Its Applications, ISA 2009, held in Seoul, Korea, in June 2009.
The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume presents recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. The papers are organized in topical sections on information assurance and its application; security protocol and its application, other security research.
The 16 revised full papers presented were carefully reviewed and selected from 137 submissions. The volume presents recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. The papers are organized in topical sections on information assurance and its application; security protocol and its application, other security research.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
From the reviews:
"The proceedings of the Third International Conference on Advances in Information Security and its Applications (ISA) present 16 papers that are related to the multifaceted aspects of information security and assurance. ... This book will be useful to both information technology (IT) security researchers and practitioners. ... It is well written and easy to understand, and the author provides experimental results that support the design. ... suitable for researchers, graduate students (as a reference), and engineers (for self-study)." (Zheng Gong, ACM Computing Reviews, October, 2009)
"The proceedings of the Third International Conference on Advances in Information Security and its Applications (ISA) present 16 papers that are related to the multifaceted aspects of information security and assurance. ... This book will be useful to both information technology (IT) security researchers and practitioners. ... It is well written and easy to understand, and the author provides experimental results that support the design. ... suitable for researchers, graduate students (as a reference), and engineers (for self-study)." (Zheng Gong, ACM Computing Reviews, October, 2009)