Information Security Applications

9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers

  • Kyo-Il Chung
  • Kiwook Sohn
  • Moti Yung
Conference proceedings WISA 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5379)

Table of contents

  1. Front Matter
  2. Smart Card and Secure Hardware(1)

    1. Marcel Medwed, Elisabeth Oswald
      Pages 14-27
    2. Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh
      Pages 28-40
  3. Wireless and Sensor Network Security(1)

    1. Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. E. Tapiador, Arturo Ribagorda
      Pages 56-68
    2. Md. Shariful Islam, Md. Abdul Hamid, Byung Goo Choi, Choong Seon Hong
      Pages 69-83
  4. Public Key Crypto Applications

    1. Camille Vuillaume, Katsuyuki Okeya, Erik Dahmen, Johannes Buchmann
      Pages 84-98
    2. S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan
      Pages 115-129
  5. Privacy and Anonymity

    1. Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka
      Pages 130-144
    2. Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta
      Pages 160-173
  6. N/W Security and Intrusion Detection

  7. Application Security and Trust Management

    1. Hassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Yuan Wei Wei, Syed Muhammad Khaliq-ur-rehman Raazi, Ngo Trong Canh et al.
      Pages 211-224
    2. Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai
      Pages 225-239
    3. Marek Klonowski, Michał Przykucki, Tomasz Strumiński
      Pages 240-255
  8. Smart Card and Secure Hardware(2)

    1. Jörn-Marc Schmidt, Chong Hee Kim
      Pages 256-265

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008.

The 24 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on smart card and secure hardware, wireless and sensor network security, public key crypto applications, privacy and anonymity, n/w security and intrusion detection, as well as application security and trust management.

Keywords

AES Broadcast Protection access control anonymity authentication bilinear pairing block ciphers broadcast encryption certificate-based cryptanalysis cryptographic hardware cryptographic protocols digital forensic security

Editors and affiliations

  • Kyo-Il Chung
    • 1
  • Kiwook Sohn
    • 2
  • Moti Yung
    • 3
  1. 1.Information Security Research DivisionElectronics and Telecommunications Research Institute (ETRI)DaejeonKorea
  2. 2.The Attached Institute of Electronics and Telecommunications Research Institute (ETRI)DaejeonKorea
  3. 3.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-00306-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-00305-9
  • Online ISBN 978-3-642-00306-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book