Skip to main content
  • Conference proceedings
  • © 2012

Information Security Applications

12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers

  • Up to date results
  • Fast track conference proceedings
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7115)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISA: International Conference on Information Security Applications

Conference proceedings info: WISA 2011.

Buy it now

Buying options

Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Table of contents (21 papers)

  1. Front Matter

  2. Generalized Security Analysis of the Random Key Bits Leakage Attack

    • Jun Kogure, Noboru Kunihiro, Hirosuke Yamamoto
    Pages 13-27
  3. Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher

    • Yanjun Li, Wenling Wu, Lei Zhang
    Pages 28-39
  4. Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward

    • Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama
    Pages 40-54
  5. Known-Key Distinguisher on Round-Reduced 3D Block Cipher

    • Le Dong, Wenling Wu, Shuang Wu, Jian Zou
    Pages 55-69
  6. Identity-Based Signcryption from Identity-Based Cryptography

    • Woomyo Lee, Jae Woo Seo, Pil Joong Lee
    Pages 70-83
  7. Order-Preserving Encryption for Non-uniformly Distributed Plaintexts

    • Dae Hyun Yum, Duk Soo Kim, Jin Seok Kim, Pil Joong Lee, Sung Je Hong
    Pages 84-97
  8. Solving a DLP with Auxiliary Input with the ρ-Algorithm

    • Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
    Pages 98-108
  9. A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage

    • Tatsuyuki Matsushita, Shinji Yamanaka, Fangming Zhao
    Pages 121-135
  10. Rule Indexing for Efficient Intrusion Detection Systems

    • Boojoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im
    Pages 136-141
  11. Security Data Extraction from IEC 61850 ACSI Models for Network and System Management

    • Chung-Hyo Kim, Moon-Seok Choi, Seong-Ho Ju, Yong-Hun Lim, Jong-Mock Baek
    Pages 142-150
  12. A Map-Layer-Based Access Control Model

    • Yingjun Zhang, Yang Zhang, Kai Chen
    Pages 157-170
  13. Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols

    • Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura
    Pages 187-202
  14. Mutual Private Set Intersection with Linear Complexity

    • Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon
    Pages 219-231

Other Volumes

  1. Information Security Applications

About this book

This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA 2011, held in Jeju Island, Korea, in August 2011. The 21 revised full papers presented were carefully reviewed and selected from 74 submissions. The workshop serves as a forum for new results from the academic research community as well as from the industry; the papers are focusing on all technical and practical aspects of cryptographic and non-cryptographic security applications.

Editors and Affiliations

  • School of Electronic Engineering, Soongsil University, Seoul, Korea

    Souhwan Jung

  • Google Inc. and Computer Science Department, Columbia University, New York, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access