Advertisement

Information Security Applications

14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers

  • Yongdae Kim
  • Heejo Lee
  • Adrian Perrig

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8267)

Also part of the Security and Cryptology book sub series (LNSC, volume 8267)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Cryptography

    1. Front Matter
      Pages 1-1
    2. Deukjo Hong, Jung-Keun Lee, Dong-Chan Kim, Daesung Kwon, Kwon Ho Ryu, Dong-Geon Lee
      Pages 3-27
    3. Jing Lv, Bin Zhang, Dongdai Lin
      Pages 28-38
  3. Social Network Security

    1. Front Matter
      Pages 63-63
    2. Heesung Do, Peter Choi, Heejo Lee
      Pages 81-99
  4. Mobile Security

    1. Front Matter
      Pages 101-101
    2. Hayoung Lee, Taeho Kang, Sangho Lee, Jong Kim, Yoonho Kim
      Pages 124-137
  5. Network Security

    1. Front Matter
      Pages 161-161
    2. Arjun P. Athreya, Xiao Wang, Yu Seung Kim, Yuan Tian, Patrick Tague
      Pages 174-188
    3. Christopher Meyer, Jörg Schwenk
      Pages 189-209
  6. Looking Future

    1. Front Matter
      Pages 211-211
    2. Eugene Y. Vasserman, John Hatcliff
      Pages 213-217
    3. YongJoo Song, Seungwon Shin, Yongjin Choi
      Pages 218-230
    4. Aziz Mohaisen, Omar Alrawi, Matt Larson, Danny McPherson
      Pages 231-241
  7. Privacy

    1. Front Matter
      Pages 243-243
    2. Anton Mosunov, Vineet Sinha, Heather Crawford, John Aycock, Daniel Medeiros Nunes de Castro, Rashmi Kumari
      Pages 245-259
    3. Cheolmin Sky Moon, Sam Chung, Barbara Endicott-Popovsky
      Pages 260-271
  8. Back Matter
    Pages 273-273

About these proceedings

Introduction

This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.

Keywords

anomaly detection cryptography denial of service attacks intrusion detection mobile security

Editors and affiliations

  • Yongdae Kim
    • 1
  • Heejo Lee
    • 2
  • Adrian Perrig
    • 3
  1. 1.KAISTDaejeonKorea, Republic of (South Korea)
  2. 2.Korea UniversitySeoulKorea, Republic of (South Korea)
  3. 3.CyLab Carnegie Mellon UniversityPittsburghUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-05149-9
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-05148-2
  • Online ISBN 978-3-319-05149-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site