Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Advances in information security and its application : third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings
Park J. (ed), Zhan J. (ed), Lee C. (ed), Wang G., Kim T. (ed), Yeo S. (ed), Springer Publishing Company, Incorporated, New York, NY, 2009. 127 pp.  Type: Book (9783642026324)
Date Reviewed: Oct 20 2009

The proceedings of the Third International Conference on Advances in Information Security and Its Applications (ISA) contains 16 papers that are related to the multifaceted aspects of information security and assurance. The papers mostly focus on attacks and protections for real-life applications, including wireless sensor network (WSN) security, user authentication, access control, security engineering, virus protection, and digital forensics. This book will be useful to both information technology (IT) security researchers and practitioners. It presents the information security and assurance field’s progress, although it might not be the best choice for beginners.

Although it is impossible to comment on every paper, I strongly recommend “Designing low-cost cryptographic hardware for wired- or wireless point-to-point connections.” It presents a low-cost technique for lightweight symmetric key exchange that extends and optimizes the existing results. It is well written and easy to understand, and the author provides experimental results that support the design.

Based on its editorial and technical qualities, the proceedings of ISA 2009 are suitable for researchers, graduate students (as a reference), and engineers (for self-study).

Reviewer:  Zheng Gong Review #: CR137381 (1010-0965)
Bookmark and Share
Security and Protection (C.2.0 ... )
Security and Protection (K.6.5 )
Would you recommend this review?
Other reviews under "Security and Protection": Date
Data-driven model-based detection of malicious insiders via physical access logs
Cheh C., Thakore U., Fawaz A., Chen B., Temple W., Sanders W.  ACM Transactions on Modeling and Computer Simulation 29(4): 1-25, 2019. Type: Article
Mar 8 2021
5G enabled secure wireless networks
Jayakody D., Srinivasan K., Sharma V.,  Springer International Publishing, New York, NY, 2019. 200 pp. Type: Book (978-3-030035-07-5)
Jan 15 2021
Big data privacy preservation for cyber-physical systems
Pan M., Wang J., Errapotu S., Zhang X., Ding J., Han Z.,  Springer International Publishing, New York, NY, 2019. 84 pp. Type: Book (978-3-030133-69-6)
Nov 11 2020

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy