Information Security Applications

12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers

  • Souhwan Jung
  • Moti Yung
Conference proceedings WISA 2011

DOI: 10.1007/978-3-642-27890-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7115)

Table of contents (21 papers)

  1. Front Matter
  2. Generalized Security Analysis of the Random Key Bits Leakage Attack
    Jun Kogure, Noboru Kunihiro, Hirosuke Yamamoto
    Pages 13-27
  3. Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher
    Yanjun Li, Wenling Wu, Lei Zhang
    Pages 28-39
  4. Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward
    Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama
    Pages 40-54
  5. Known-Key Distinguisher on Round-Reduced 3D Block Cipher
    Le Dong, Wenling Wu, Shuang Wu, Jian Zou
    Pages 55-69
  6. Identity-Based Signcryption from Identity-Based Cryptography
    Woomyo Lee, Jae Woo Seo, Pil Joong Lee
    Pages 70-83
  7. Order-Preserving Encryption for Non-uniformly Distributed Plaintexts
    Dae Hyun Yum, Duk Soo Kim, Jin Seok Kim, Pil Joong Lee, Sung Je Hong
    Pages 84-97
  8. Solving a DLP with Auxiliary Input with the ρ-Algorithm
    Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
    Pages 98-108
  9. A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage
    Tatsuyuki Matsushita, Shinji Yamanaka, Fangming Zhao
    Pages 121-135
  10. Rule Indexing for Efficient Intrusion Detection Systems
    Boojoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im
    Pages 136-141
  11. Security Data Extraction from IEC 61850 ACSI Models for Network and System Management
    Chung-Hyo Kim, Moon-Seok Choi, Seong-Ho Ju, Yong-Hun Lim, Jong-Mock Baek
    Pages 142-150
  12. Lightweight Middleware-Based ZigBee Security in Building Energy Management System
    Insung Hong, Jisung Byun, Sehyun Park
    Pages 151-156
  13. A Map-Layer-Based Access Control Model
    Yingjun Zhang, Yang Zhang, Kai Chen
    Pages 157-170
  14. Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols
    Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura
    Pages 187-202
  15. Mutual Private Set Intersection with Linear Complexity
    Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon
    Pages 219-231

About these proceedings


This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA 2011, held in Jeju Island, Korea, in August 2011. The 21 revised full papers presented were carefully reviewed and selected from 74 submissions. The workshop serves as a forum for new results from the academic research community as well as from the industry; the papers are focusing on all technical and practical aspects of cryptographic and non-cryptographic security applications.


application authentication biometrics grid security identity-based cryptography wireless sensor networks

Editors and affiliations

  • Souhwan Jung
    • 1
  • Moti Yung
    • 2
  1. 1.School of Electronic EngineeringSoongsil UniversitySeoulKorea
  2. 2.Google Inc. and Computer Science DepartmentColumbia UniversityNew YorkUSA

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-27889-1
  • Online ISBN 978-3-642-27890-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349