© 2011

Information Security Applications

11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers

  • Yongwha Chung
  • Moti Yung
Conference proceedings WISA 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6513)

Table of contents

  1. Front Matter
  2. Cryptosystem

    1. Sumit Kumar Pandey, Rana Barua
      Pages 1-14
    2. Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama
      Pages 15-30
    3. Wenpan Jing, Haixia Xu, Bao Li
      Pages 31-43
    4. Takashi Nishide, Kouichi Sakurai
      Pages 44-60
  3. Implementation

    1. Boufeldja Allailou, Abdelaziz Marjane, Abdellah Mokrane
      Pages 76-91
    2. Erich Wenger, Martin Feldhofer, Norbert Felber
      Pages 92-106
    3. Takehiko Amaki, Masanori Hashimoto, Yukio Mitsuyama, Takao Onoye
      Pages 107-121
  4. Mobile Security/Secure Coding

    1. Jae-hoon Jang, Don-Gu Yeo, Dong-hee Lee, Heung-Youl Youm
      Pages 150-159
    2. Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi
      Pages 160-174
  5. Attack

    1. M. Abdelaziz Elaabid, Olivier Meynard, Sylvain Guilley, Jean-Luc Danger
      Pages 175-190
    2. Hongying Liu, Guoyu Qian, Satoshi Goto, Yukiyasu Tsunoo
      Pages 191-205
    3. Nico Döttling, Dejan Lazich, Jörn Müller-Quade, Antonio Sobreira de Almeida
      Pages 206-220
    4. Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li
      Pages 234-242
    5. Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall
      Pages 243-257
    6. Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, Kazuo Ohta
      Pages 258-272

About these proceedings


This book constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA 2010, held in Jeju Island, Korea, in August 2010.

The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.


access control authentication cryptanalysis cryptographic protocols cryptographic security applications non-cryptographic security applications security side channel attacks signatures

Editors and affiliations

  • Yongwha Chung
    • 1
  • Moti Yung
    • 2
  1. 1.Department of Computer and Information ScienceKorea UniversityChungnam-doKorea
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNewYorkUSA

Bibliographic information