Information Security Applications

13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers

Editors:

ISBN: 978-3-642-35415-1 (Print) 978-3-642-35416-8 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Symmetric Cipher

    1. No Access

      Book Chapter

      Pages 1-14

      Security on LBlock against Biclique Cryptanalysis

    2. No Access

      Book Chapter

      Pages 15-27

      Improved Impossible Differential Attacks on Reduced-Round MISTY1

    3. No Access

      Book Chapter

      Pages 28-42

      Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs

    4. No Access

      Book Chapter

      Pages 43-54

      Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity

  3. Secure Hardware/Public Key Crypto Application

    1. No Access

      Book Chapter

      Pages 55-67

      Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors

    2. No Access

      Book Chapter

      Pages 68-81

      Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumption

    3. No Access

      Book Chapter

      Pages 82-95

      Improved Differential Fault Analysis on Block Cipher ARIA

    4. No Access

      Book Chapter

      Pages 96-110

      Multi-Level Controlled Signature

    5. No Access

      Book Chapter

      Pages 111-123

      Tate Pairing Computation on Generalized Hessian Curves

    6. No Access

      Book Chapter

      Pages 124-143

      Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model

  4. Cryptographic Protocols/ Digital Forensics

    1. No Access

      Book Chapter

      Pages 144-160

      An Authentication and Key Management Scheme for the Proxy Mobile IPv6

    2. No Access

      Book Chapter

      Pages 161-176

      Payment Approval for PayWord

    3. No Access

      Book Chapter

      Pages 177-191

      Anonymity-Based Authenticated Key Agreement with Full Binding Property

    4. No Access

      Book Chapter

      Pages 192-207

      A Study for Classification of Web Browser Log and Timeline Visualization

    5. No Access

      Book Chapter

      Pages 208-225

      Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions

    6. No Access

      Book Chapter

      Pages 226-240

      N-Victims: An Approach to Determine N-Victims for APT Investigations

  5. Network Security

    1. No Access

      Book Chapter

      Pages 241-253

      An Efficient Filtering Method for Detecting Malicous Web Pages

    2. No Access

      Book Chapter

      Pages 254-269

      Lightweight Client-Side Methods for Detecting Email Forgery

    3. No Access

      Book Chapter

      Pages 270-284

      AIGG Threshold Based HTTP GET Flooding Attack Detection

    4. No Access

      Book Chapter

      Pages 285-295

      Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks

previous Page of 2