Information Security Applications

10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers

  • Heung Youl Youm
  • Moti Yung
Conference proceedings WISA 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5932)

Table of contents

  1. Front Matter
  2. Multimedia Security

    1. Hyeokchan Kwon, Yong-Hyuk Moon, Jaehoon Nah, Dongil Seo
      Pages 1-9
    2. KyoungHee Ko, Hwan-Kuk Kim, JeongWook Kim, Chang-Yong Lee, Soo-Gil Cha, Hyun Cheol Jeong
      Pages 10-19
  3. Device Security

    1. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
      Pages 20-35
    2. Gildas Avoine, Cédric Lauradoux, Tania Martin
      Pages 36-50
  4. HW Implementation Security

    1. Takeshi Sugawara, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone et al.
      Pages 66-78
  5. Applied Cryptography

    1. Fangguo Zhang, Xingwen Zhao, Xiaofeng Chen
      Pages 133-147
  6. Side Channel Attacks

    1. Neil Hanley, Michael Tunstall, William P. Marnane
      Pages 148-162
    2. Thomas Plos, Michael Hutter, Martin Feldhofer
      Pages 163-177
    3. Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh
      Pages 193-205
  7. Cryptograptanalysis

    1. Nicky Mouha, Christophe De Cannière, Sebastiaan Indesteege, Bart Preneel
      Pages 206-225
    2. Kahraman D. Akdemir, Ghaith Hammouri, Berk Sunar
      Pages 226-238
    3. Jia Xie, Weiwei Cao, TianZe Wang
      Pages 239-253

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009.

The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.

Keywords

Broadcast Proxy access control anonymity authentication calculus cryptoanalysis cryptographic protocol cryptography information security logic network security privacy secret sharing security

Editors and affiliations

  • Heung Youl Youm
    • 1
  • Moti Yung
    • 2
  1. 1.Department of Information Security EngineeringSoonchunhyang UniversityKorea
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-10838-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-10837-2
  • Online ISBN 978-3-642-10838-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book