Limit search to available items
Book Cover
E-book
Author WISA 2012 (2012 : Cheju Island, Korea)

Title Information security applications : 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised selected papers / Dong Hoon Lee, Moti Yung (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource
Series Lecture notes in computer science ; 7690
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7690.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Security on LBlock against Biclique Cryptanalysis / Yanfeng Wang, Wenling Wu, Xiaoli Yu and Lei Zhang -- Improved Impossible Differential Attacks on Reduced-Round MISTY1 / Keting Jia and Leibo Li -- Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs / Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng and Kouichi Sakurai -- Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity / Wentao Zhao, Xin Hai, Shaojing Fu, Chao Li and Yanfeng Wang -- Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors / Hwajeong Seo and Howon Kim -- Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumption / Hyunmin Kim, Vladimir Rozic and Ingrid Verbauwhede -- Improved Differential Fault Analysis on Block Cipher ARIA / JeaHoon Park and JaeCheol Ha -- Multi-Level Controlled Signature / Pairat Thorncharoensri, Willy Susilo and Yi Mu -- Tate Pairing Computation on Generalized Hessian Curves / Liangze Li and Fan Zhang
Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model / Mario Larangeira and Keisuke Tanaka -- An Authentication and Key Management Scheme for the Proxy Mobile IPv6 / Hyun-Sun Kang and Chang-Seop Park -- Payment Approval for PayWord / László Aszalós and Andrea Huszti -- Anonymity-Based Authenticated Key Agreement with Full Binding Property / Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee and DaeHun Nyang -- A Study for Classification of Web Browser Log and Timeline Visualization / Junghoon Oh, Namheun Son, Sangjin Lee and Kyungho Lee -- Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions / François Durvaux, Benoît Gérard, Stéphanie Kerckhof, François Koeune and François-Xavier Standaert -- N-Victims: An Approach to Determine N-Victims for APT Investigations / Shun-Te Liu, Yi-Ming Chen and Hui-Ching Hung -- An Efficient Filtering Method for Detecting Malicous Web Pages / Jaeun Choi, Gisung Kim, Tae Ghyoon Kim and Sehun Kim
Lightweight Client-Side Methods for Detecting Email Forgery / Eric Lin, John Aycock and Mohammad Mannan -- AIGG Threshold Based HTTP GET Flooding Attack Detection / Yang-seo Choi, Ik-Kyun Kim, Jin-Tae Oh and Jong-Soo Jang -- Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks / Hyunjoo Kim, Byoungkoo Kim, Daewon Kim, Ik-Kyun Kim and Tai-Myoung Chung -- Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice / Rasheed Hussain, Sangjin Kim and Heekuck Oh -- On Trigger Detection against Reactive Jamming Attacks: A Localized Solution / Incheol Shin, Sinkyu Kim and Jungtaek Seo -- Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs / Yu-Chih Wei and Yi-Ming Chen -- A Trust Management Model for QoS-Based Service Selection / Yukyong Kim and Kyung-Goo Doh -- Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems / Haklin Kimm and Norkee Sherpa
Summary This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security
Analysis computerwetenschappen
computer sciences
informatiesystemen
information systems
internet
algoritmen
algorithms
computeranalyse
computer analysis
gegevensbeheer
data management
computernetwerken
computer networks
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Bibliography Includes bibliographical references and index
Notes English
Print version record
Subject Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Computer security -- Congresses
Database security -- Congresses
Informatique.
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Database security
Genre/Form proceedings (reports)
Conference papers and proceedings
Software.
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Lee, Dong Hoon.
Yung, Moti.
ISBN 9783642354168
3642354165
3642354157
9783642354151
Other Titles WISA 2012