Advertisement

© 2014

Information Security Applications

14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers

  • Yongdae Kim
  • Heejo Lee
  • Adrian Perrig
Conference proceedings WISA 2013

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8267)

Also part of the Security and Cryptology book sub series (LNSC, volume 8267)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Cryptography

    1. Front Matter
      Pages 1-1
    2. Deukjo Hong, Jung-Keun Lee, Dong-Chan Kim, Daesung Kwon, Kwon Ho Ryu, Dong-Geon Lee
      Pages 3-27
    3. Jing Lv, Bin Zhang, Dongdai Lin
      Pages 28-38
  3. Social Network Security

    1. Front Matter
      Pages 63-63
    2. Heesung Do, Peter Choi, Heejo Lee
      Pages 81-99
  4. Mobile Security

    1. Front Matter
      Pages 101-101
    2. Hayoung Lee, Taeho Kang, Sangho Lee, Jong Kim, Yoonho Kim
      Pages 124-137
  5. Network Security

    1. Front Matter
      Pages 161-161
    2. Arjun P. Athreya, Xiao Wang, Yu Seung Kim, Yuan Tian, Patrick Tague
      Pages 174-188
    3. Christopher Meyer, Jörg Schwenk
      Pages 189-209
  6. Looking Future

    1. Front Matter
      Pages 211-211
    2. Eugene Y. Vasserman, John Hatcliff
      Pages 213-217
    3. YongJoo Song, Seungwon Shin, Yongjin Choi
      Pages 218-230

About these proceedings

Introduction

This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.

Keywords

anomaly detection cryptography denial of service attacks intrusion detection mobile security

Editors and affiliations

  • Yongdae Kim
    • 1
  • Heejo Lee
    • 2
  • Adrian Perrig
    • 3
  1. 1.KAISTDaejeonKorea, Republic of (South Korea)
  2. 2.Korea UniversitySeoulKorea, Republic of (South Korea)
  3. 3.CyLab Carnegie Mellon UniversityPittsburghUSA

Bibliographic information

  • Book Title Information Security Applications
  • Book Subtitle 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers
  • Editors Yongdae Kim
    Heejo Lee
    Adrian Perrig
  • Series Title Lecture Notes in Computer Science
  • Series Abbreviated Title Lect.Notes Computer
  • DOI https://doi.org/10.1007/978-3-319-05149-9
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Softcover ISBN 978-3-319-05148-2
  • eBook ISBN 978-3-319-05149-9
  • Series ISSN 0302-9743
  • Series E-ISSN 1611-3349
  • Edition Number 1
  • Number of Pages XII, 273
  • Number of Illustrations 79 b/w illustrations, 0 illustrations in colour
  • Topics Systems and Data Security
    Cryptology
  • Buy this book on publisher's site