Atjaunināt sīkdatņu piekrišanu

Information Security Applications: 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers 1st ed. 2016 [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 438 pages, height x width: 235x155 mm, weight: 6847 g, 127 Illustrations, black and white; XVI, 438 p. 127 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 9503
  • Izdošanas datums: 24-Mar-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319318748
  • ISBN-13: 9783319318745
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 438 pages, height x width: 235x155 mm, weight: 6847 g, 127 Illustrations, black and white; XVI, 438 p. 127 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 9503
  • Izdošanas datums: 24-Mar-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319318748
  • ISBN-13: 9783319318745
This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015.









The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections such as hardware security; cryptography, side channel attacks and countermeasures; security and threat analysis; IoT security; network security; cryptography; application security.
Hardware security.- Cryptography.- Side channel attacks and countermeasures.-Security and threat analysis.- IoT security.- Network security.- Cryptography.-Application security.