Advertisement

Information Security Applications

10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers

  • Heung Youl Youm
  • Moti Yung
Conference proceedings WISA 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5932)

Table of contents

  1. Front Matter
  2. Multimedia Security

    1. Hyeokchan Kwon, Yong-Hyuk Moon, Jaehoon Nah, Dongil Seo
      Pages 1-9
    2. KyoungHee Ko, Hwan-Kuk Kim, JeongWook Kim, Chang-Yong Lee, Soo-Gil Cha, Hyun Cheol Jeong
      Pages 10-19
  3. Device Security

    1. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
      Pages 20-35
    2. Gildas Avoine, Cédric Lauradoux, Tania Martin
      Pages 36-50
  4. HW Implementation Security

    1. Takeshi Sugawara, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone et al.
      Pages 66-78
  5. Applied Cryptography

    1. Fangguo Zhang, Xingwen Zhao, Xiaofeng Chen
      Pages 133-147
  6. Side Channel Attacks

    1. Neil Hanley, Michael Tunstall, William P. Marnane
      Pages 148-162
    2. Thomas Plos, Michael Hutter, Martin Feldhofer
      Pages 163-177
    3. Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh
      Pages 193-205
  7. Cryptograptanalysis

    1. Nicky Mouha, Christophe De Cannière, Sebastiaan Indesteege, Bart Preneel
      Pages 206-225
    2. Kahraman D. Akdemir, Ghaith Hammouri, Berk Sunar
      Pages 226-238
    3. Jia Xie, Weiwei Cao, TianZe Wang
      Pages 239-253
  8. Anonymity/Authentication/Access Control

    1. Rasheed Hussain, Sangjin Kim, Heekuck Oh
      Pages 268-280
    2. Keita Emura, Atsuko Miyaji, Kazumasa Omote
      Pages 281-295
    3. Heike Busch, Stefan Katzenbeisser, Paul Baecher
      Pages 296-308
    4. Luan Ibraimi, Milan Petkovic, Svetla Nikova, Pieter Hartel, Willem Jonker
      Pages 309-323
  9. Network Security

    1. Dae Hyun Yum, Sun Young Kim, HoKun Moon, Mi-Yeon Kim, Jae-Hoon Roh, Pil Joong Lee
      Pages 339-353
    2. Mijoo Kim, Mi Yeon Yoon, Hyun Cheol Jeong, Heung Youl Youm
      Pages 354-365
  10. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009.

The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.

Keywords

Broadcast Proxy access control anonymity authentication calculus cryptoanalysis cryptographic protocol cryptography information security logic network security privacy secret sharing security

Editors and affiliations

  • Heung Youl Youm
    • 1
  • Moti Yung
    • 2
  1. 1.Department of Information Security EngineeringSoonchunhyang UniversityKorea
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-10838-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-10837-2
  • Online ISBN 978-3-642-10838-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site