Information Security Applications

13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers

  • Dong Hoon Lee
  • Moti Yung
Conference proceedings WISA 2012

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7690)

Table of contents

  1. Front Matter
  2. Symmetric Cipher

    1. Yanfeng Wang, Wenling Wu, Xiaoli Yu, Lei Zhang
      Pages 1-14
    2. Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai
      Pages 28-42
    3. Wentao Zhao, Xin Hai, Shaojing Fu, Chao Li, Yanfeng Wang
      Pages 43-54
  3. Secure Hardware/Public Key Crypto Application

  4. Cryptographic Protocols/ Digital Forensics

    1. Hyun-Sun Kang, Chang-Seop Park
      Pages 144-160
    2. László Aszalós, Andrea Huszti
      Pages 161-176
    3. Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang
      Pages 177-191
    4. Junghoon Oh, Namheun Son, Sangjin Lee, Kyungho Lee
      Pages 192-207
    5. François Durvaux, Benoît Gérard, Stéphanie Kerckhof, François Koeune, François-Xavier Standaert
      Pages 208-225
    6. Shun-Te Liu, Yi-Ming Chen, Hui-Ching Hung
      Pages 226-240
  5. Network Security

    1. Jaeun Choi, Gisung Kim, Tae Ghyoon Kim, Sehun Kim
      Pages 241-253
    2. Eric Lin, John Aycock, Mohammad Mannan
      Pages 254-269
    3. Yang-seo Choi, Ik-Kyun Kim, Jin-Tae Oh, Jong-Soo Jang
      Pages 270-284
    4. Hyunjoo Kim, Byoungkoo Kim, Daewon Kim, Ik-Kyun Kim, Tai-Myoung Chung
      Pages 285-295
    5. Incheol Shin, Sinkyu Kim, Jungtaek Seo
      Pages 312-327
  6. Trust Management/Database Security

  7. Back Matter

About these proceedings


This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012.
The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.


QoS cryptography elliptic curves malware detection side channel attack

Editors and affiliations

  • Dong Hoon Lee
    • 1
  • Moti Yung
    • 2
  1. 1.Center for Information Security TechnologiesKorea UniversitySeoulKorea
  2. 2.Computer Science DepartmentColumbia UniversityNew YorkUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-35415-1
  • Online ISBN 978-3-642-35416-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site