Skip to main content
  • Conference proceedings
  • © 2012

Information Security Applications

13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers

  • High quality selected papers
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7690)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISA: International Conference on Information Security Applications

Conference proceedings info: WISA 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Symmetric Cipher

    1. Security on LBlock against Biclique Cryptanalysis

      • Yanfeng Wang, Wenling Wu, Xiaoli Yu, Lei Zhang
      Pages 1-14
    2. Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs

      • Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai
      Pages 28-42
    3. Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity

      • Wentao Zhao, Xin Hai, Shaojing Fu, Chao Li, Yanfeng Wang
      Pages 43-54
  3. Secure Hardware/Public Key Crypto Application

    1. Improved Differential Fault Analysis on Block Cipher ARIA

      • JeaHoon Park, JaeCheol Ha
      Pages 82-95
    2. Multi-Level Controlled Signature

      • Pairat Thorncharoensri, Willy Susilo, Yi Mu
      Pages 96-110
    3. Tate Pairing Computation on Generalized Hessian Curves

      • Liangze Li, Fan Zhang
      Pages 111-123
  4. Cryptographic Protocols/ Digital Forensics

    1. An Authentication and Key Management Scheme for the Proxy Mobile IPv6

      • Hyun-Sun Kang, Chang-Seop Park
      Pages 144-160
    2. Payment Approval for PayWord

      • László Aszalós, Andrea Huszti
      Pages 161-176
    3. Anonymity-Based Authenticated Key Agreement with Full Binding Property

      • Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang
      Pages 177-191
    4. A Study for Classification of Web Browser Log and Timeline Visualization

      • Junghoon Oh, Namheun Son, Sangjin Lee, Kyungho Lee
      Pages 192-207
    5. Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions

      • François Durvaux, Benoît Gérard, Stéphanie Kerckhof, François Koeune, François-Xavier Standaert
      Pages 208-225
    6. N-Victims: An Approach to Determine N-Victims for APT Investigations

      • Shun-Te Liu, Yi-Ming Chen, Hui-Ching Hung
      Pages 226-240
  5. Network Security

    1. An Efficient Filtering Method for Detecting Malicous Web Pages

      • Jaeun Choi, Gisung Kim, Tae Ghyoon Kim, Sehun Kim
      Pages 241-253
    2. Lightweight Client-Side Methods for Detecting Email Forgery

      • Eric Lin, John Aycock, Mohammad Mannan
      Pages 254-269
    3. AIGG Threshold Based HTTP GET Flooding Attack Detection

      • Yang-seo Choi, Ik-Kyun Kim, Jin-Tae Oh, Jong-Soo Jang
      Pages 270-284

Other Volumes

  1. Information Security Applications

About this book

This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012.
The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.

Editors and Affiliations

  • Center for Information Security Technologies, Korea University, Seoul, Korea

    Dong Hoon Lee

  • Computer Science Department, Columbia University, New York, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access