Information Security Applications

13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers

  • Dong Hoon Lee
  • Moti Yung
Conference proceedings WISA 2012

DOI: 10.1007/978-3-642-35416-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7690)

Table of contents (25 papers)

  1. Front Matter
  2. Symmetric Cipher

    1. Security on LBlock against Biclique Cryptanalysis
      Yanfeng Wang, Wenling Wu, Xiaoli Yu, Lei Zhang
      Pages 1-14
    2. Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs
      Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai
      Pages 28-42
    3. Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity
      Wentao Zhao, Xin Hai, Shaojing Fu, Chao Li, Yanfeng Wang
      Pages 43-54
  3. Secure Hardware/Public Key Crypto Application

  4. Cryptographic Protocols/ Digital Forensics

    1. An Authentication and Key Management Scheme for the Proxy Mobile IPv6
      Hyun-Sun Kang, Chang-Seop Park
      Pages 144-160
    2. Payment Approval for PayWord
      László Aszalós, Andrea Huszti
      Pages 161-176
    3. Anonymity-Based Authenticated Key Agreement with Full Binding Property
      Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang
      Pages 177-191
    4. A Study for Classification of Web Browser Log and Timeline Visualization
      Junghoon Oh, Namheun Son, Sangjin Lee, Kyungho Lee
      Pages 192-207
    5. Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions
      François Durvaux, Benoît Gérard, Stéphanie Kerckhof, François Koeune, François-Xavier Standaert
      Pages 208-225
    6. N-Victims: An Approach to Determine N-Victims for APT Investigations
      Shun-Te Liu, Yi-Ming Chen, Hui-Ching Hung
      Pages 226-240
  5. Network Security

    1. An Efficient Filtering Method for Detecting Malicous Web Pages
      Jaeun Choi, Gisung Kim, Tae Ghyoon Kim, Sehun Kim
      Pages 241-253
    2. Lightweight Client-Side Methods for Detecting Email Forgery
      Eric Lin, John Aycock, Mohammad Mannan
      Pages 254-269
    3. AIGG Threshold Based HTTP GET Flooding Attack Detection
      Yang-seo Choi, Ik-Kyun Kim, Jin-Tae Oh, Jong-Soo Jang
      Pages 270-284

About these proceedings


This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012.
The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.


QoS cryptography elliptic curves malware detection side channel attack

Editors and affiliations

  • Dong Hoon Lee
    • 1
  • Moti Yung
    • 2
  1. 1.Center for Information Security TechnologiesKorea UniversitySeoulKorea
  2. 2.Computer Science DepartmentColumbia UniversityNew YorkUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-35415-1
  • Online ISBN 978-3-642-35416-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349