Skip to main content
  • Conference proceedings
  • © 2016

Information Security Applications

16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9503)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISA: International Conference on Information Security Applications

Conference proceedings info: WISA 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (35 papers)

  1. Front Matter

    Pages I-XVI
  2. Hardware Security

    1. Front Matter

      Pages 1-1
    2. M-ORAM: A Matrix ORAM with Log N Bandwidth Cost

      • Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin
      Pages 3-15
    3. Compact Implementations of LEA Block Cipher for Low-End Microprocessors

      • Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim
      Pages 28-40
    4. Compact Implementations of LSH

      • Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
      Pages 41-53
    5. Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device

      • Hyeokchan Kwon, Kwang-Il Lee, Gaeil An, Byung-Ho Chung, Jeong-Nyeo Kim
      Pages 54-61
  3. Cryptography

    1. Front Matter

      Pages 63-63
    2. Security Analysis on RFID Mutual Authentication Protocol

      • You Sung Kang, Elizabeth O’Sullivan, Dooho Choi, Maire O’Neill
      Pages 65-74
    3. Two Types of Special Bases for Integral Lattices

      • Renzhang Liu, Yanbin Pan
      Pages 87-95
    4. Keyword Updatable PEKS

      • Hyun Sook Rhee, Dong Hoon Lee
      Pages 96-109
    5. On Partitioning Secret Data Based on Concept of Functional Safety

      • Seira Hidano, Shinsaku Kiyomoto
      Pages 110-121
    6. Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation

      • Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee
      Pages 122-133
    7. Publishing Graph Data with Subgraph Differential Privacy

      • Binh P. Nguyen, Hoa Ngo, Jihun Kim, Jong Kim
      Pages 134-145
  4. Side Channel Attacks and Countermeasures

    1. Front Matter

      Pages 159-159
    2. Secure Binary Field Multiplication

      • Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi et al.
      Pages 161-173
    3. An Improved Second-Order Power Analysis Attack Based on a New Refined Expecter

      • Hyunjin Ahn, Neil Hanley, Maire O’Neill, Dong-Guk Han
      Pages 174-186

Other Volumes

  1. Information Security Applications

About this book

This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015.

The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections such as hardware security; cryptography, side channel attacks and countermeasures; security and threat analysis; IoT security; network security; cryptography; application security.

Editors and Affiliations

  • Pusan National University, Busan, Korea (Republic of)

    Ho-won Kim

  • Electronics and Telecommunications Research Institute, Daejeon, Korea (Republic of)

    Dooho Choi

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access