Advances in Information Security and Its Application: Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings

Author:   James (Jong Hyuk) Park ,  Justin Zhan ,  Changhoon Lee ,  Guilin Wang
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2009 ed.
Volume:   36
ISBN:  

9783642026324


Pages:   127
Publication Date:   09 June 2009
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $237.47 Quantity:  
Add to Cart

Share |

Advances in Information Security and Its Application: Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings


Add your own review!

Overview

Welcome to the Third International Conference on Information Security and Ass- ance (ISA 2009). ISA 2009 was the most comprehensive conference focused on the various aspects of advances in information security and assurance. The concept of security and assurance is emerging rapidly as an exciting new paradigm to provide reliable and safe life services. Our conference provides a chance for academic and industry professionals to discuss recent progress in the area of communication and networking including modeling, simulation and novel applications associated with the utilization and acceptance of computing devices and systems. ISA 2009 was a succ- sor of the First International Workshop on Information Assurance in Networks (IAN 2007, Jeju-island, Korea, December, 2007), and the Second International Conference on Information Security and Assurance (ISA 2008, Busan, Korea, April 2008). The goal of this conference is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of information technology. ISA 2009 contained research papers submitted by researchers from all over the world. In order to guarantee high-quality proceedings, we put extensive effort into reviewing the papers. All submissions were peer reviewed by at least three Program Committee members as well as external reviewers. As the quality of the submissions was quite high, it was extremely difficult to select the papers for oral presentation and publication in the proceedings of the conference.

Full Product Details

Author:   James (Jong Hyuk) Park ,  Justin Zhan ,  Changhoon Lee ,  Guilin Wang
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2009 ed.
Volume:   36
Dimensions:   Width: 15.50cm , Height: 0.80cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9783642026324


ISBN 10:   364202632
Pages:   127
Publication Date:   09 June 2009
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Reviews

From the reviews: The proceedings of the Third International Conference on Advances in Information Security and its Applications (ISA) present 16 papers that are related to the multifaceted aspects of information security and assurance. ! This book will be useful to both information technology (IT) security researchers and practitioners. ! It is well written and easy to understand, and the author provides experimental results that support the design. ! suitable for researchers, graduate students (as a reference), and engineers (for self-study). (Zheng Gong, ACM Computing Reviews, October, 2009)


From the reviews: The proceedings of the Third International Conference on Advances in Information Security and its Applications (ISA) present 16 papers that are related to the multifaceted aspects of information security and assurance. ... This book will be useful to both information technology (IT) security researchers and practitioners. ... It is well written and easy to understand, and the author provides experimental results that support the design. ... suitable for researchers, graduate students (as a reference), and engineers (for self-study). (Zheng Gong, ACM Computing Reviews, October, 2009)


Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List