This book constitutes the refereed proceedings of the 5th International Workshop on Information Security Applications, WISA 2004, held in Jeju Island, Korea in August 2004. The 36 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 169 submissions. The papers are organized in topical sections on network and computer security, public key systems, intrusion detection, watermarking and anti-spamming, digital rights management, e-commerce security, efficient implementations, anonymous communication, and side channel attacks.
This book constitutes the refereed proceedings of the 5th International Workshop on Information Security Applications, WISA 2004, held in Jeju Island, Korea in August 2004. The 36 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 169 submissions. The papers are organized in topical sections on network and computer security, public key systems, intrusion detection, watermarking and anti-spamming, digital rights management, e-commerce security, efficient implementations, anonymous communication, and side channel attacks.
This “excellent study of foreign policy-making” explores the changing nature of US-Korea relations since 1948 (David Hundt, Political Studies Review). In A Troubled Peace, Professor Chae-Jin Lee examines the evolution of U.S. policy toward South and North Korea beginning in the mid-twentieth century, when rival regimes were installed on the Korean peninsula. He presents an enlightening analysis of the goals the United States has sought for Korea, how these goals have been articulated, and the methods used to implement them. Drawing on declassified diplomatic documents; primary materials in English, Korean, Japanese, and Chinese; and extensive interviews with American and Korean officials, Lee sheds light on critical factors that have affected U.S. policy: the functions of U.S. security policy in Korea, the role of the United States in South Korean democratization, President Clinton’s policy of constructive engagement toward North Korea, President Bush’s hegemonic policy toward North Korea, and the hexagonal linkages among the United States, China, Japan, Russia, and the two Koreas. Discussing the concepts of containment, deterrence, engagement, preemption, and appeasement, Lee’s balanced approach reveals the frustrations of all players in their attempts to arrive at a modicum of coexistence. His objective, comprehensive, and definitive study reveals a dynamic—and incredibly complex—series of relationships underpinning a troubled and tenuous peace.
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Information Security Applications, WISA 2003, held on Jeju Island, Korea, in August 2003. The 36 revised full papers were carefully reviewed and selected from 200 submissions. The papers are organized in topical sections on network security, mobile security; intrusion detection; Internet security; secure software, hardware, and systems; e-commerce security; digital rights management; biometrics and human interfaces; public key cryptography and key management; and applied cryptography.
This book is written with the belief that the peaceful unification of Korean Peninsula will be upon us on the day that every woman in North Korea uses South Korean and global cosmetics. The authors focus on understanding the intentions behind the three leaders of North Korea, Kim Il-sung, Kim Jong-il and Kim Jong-un, based on their comments on the cosmetics industry and their field guidance tendencies, analyzing the governance style of Pyongyang through women’s life and beauty culture. It is the earliest book of its kind in the women’s life and beauty culture of North Korea.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.