Skip to main content
  • Conference proceedings
  • © 2009

Information Security Applications

10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5932)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISA: International Conference on Information Security Applications

Conference proceedings info: WISA 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. Multimedia Security

    1. Protecting IPTV Service Network against Malicious Rendezvous Point

      • Hyeokchan Kwon, Yong-Hyuk Moon, Jaehoon Nah, Dongil Seo
      Pages 1-9
    2. Design and Implementation of SIP-aware Security Management System

      • KyoungHee Ko, Hwan-Kuk Kim, JeongWook Kim, Chang-Yong Lee, Soo-Gil Cha, Hyun Cheol Jeong
      Pages 10-19
  3. Device Security

    1. Application Management Framework in User Centric Smart Card Ownership Model

      • Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
      Pages 20-35
    2. When Compromised Readers Meet RFID

      • Gildas Avoine, Cédric Lauradoux, Tania Martin
      Pages 36-50
  4. HW Implementation Security

    1. Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules

      • Takeshi Sugawara, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone et al.
      Pages 66-78
  5. Applied Cryptography

    1. ID-Based Adaptive Oblivious Transfer

      • Fangguo Zhang, Xingwen Zhao, Xiaofeng Chen
      Pages 133-147
  6. Side Channel Attacks

    1. Unknown Plaintext Template Attacks

      • Neil Hanley, Michael Tunstall, William P. Marnane
      Pages 148-162
    2. On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices

      • Thomas Plos, Michael Hutter, Martin Feldhofer
      Pages 163-177
    3. A Comparative Study of Mutual Information Analysis under a Gaussian Assumption

      • Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh
      Pages 193-205
  7. Cryptograptanalysis

    1. Finding Collisions for a 45-Step Simplified HAS-V

      • Nicky Mouha, Christophe De Cannière, Sebastiaan Indesteege, Bart Preneel
      Pages 206-225
    2. Non-linear Error Detection for Finite State Machines

      • Kahraman D. Akdemir, Ghaith Hammouri, Berk Sunar
      Pages 226-238
    3. Quadratic Equations from a Kind of S-boxes

      • Jia Xie, Weiwei Cao, TianZe Wang
      Pages 239-253

Other Volumes

  1. Information Security Applications

About this book

The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busan, Korea during August 25–27, 2009. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea Internet and Security Agency (KISA), sponsored by the Ministry of Public Administration and Security (MoPAS) and the Korea Communications Commission (KCC), financially sponsored by the ST. Ltd. The aim of the workshop was to serve as a forum for presenting new research and experimental results in the area of information security applications from academic communities as well as from industry. The workshop program covered a wide range of security aspects, from cryptography to systems and network security and experimental work as well. It was our great pleasure and honor to serve as the Program Committee Co-chairs of WISA2009. This year, too, the proceedings of the workshop were published in the LNCS series of Springer. The WISA 2009 Program Committee received 79 papers form 16 countries. This year the submissions were exceptionally strong, and the committee accepted 27 papers for the full paper presentation track. All the papers were carefully evaluated through blind peer-review by at least three members of the Program Comm- tee. We would like to say that acceptance is a great achievement since the selection process was highly competitive, and many good papers were not accepted.

Editors and Affiliations

  • Department of Information Security Engineering, Soonchunhyang University, Korea

    Heung Youl Youm

  • Computer Science Department, Google Inc. and Columbia University, New York, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access