Information security applications 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised selected papers /

This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and select...

Full description

Corporate Authors: WISA 2012 Cheju Island, Korea)
Other Authors: WISA 2012, Lee, Dong Hoon., Yung, Moti., SpringerLink (Online service)
Format: eBook
Language: English
Published: Berlin ; New York : Springer, ©2012.
Berlin ; New York : [2012]
Physical Description: 1 online resource.
Series: Lecture notes in computer science ; 7690.
LNCS sublibrary. Security and cryptology.
Subjects:
LEADER 09507cam a2201393 a 4500
001 820026024
003 OCoLC
005 20240223121953.0
006 m o d
007 cr cnu---unuuu
008 121203s2012 gw ob 101 0 eng d
019 |a 818734653  |a 818736009  |a 818827385  |a 848158096  |a 964891456  |a 985056212  |a 1005775642  |a 1027303968  |a 1058271958  |a 1066633319  |a 1081199772 
020 |a 9783642354168  |q (electronic bk.) 
020 |a 3642354165  |q (electronic bk.) 
020 |a 3642354157 
020 |a 9783642354151 
020 |z 9783642354151 
024 7 |a 10.1007/978-3-642-35416-8  |2 doi 
035 |a (OCoLC)820026024  |z (OCoLC)818734653  |z (OCoLC)818736009  |z (OCoLC)818827385  |z (OCoLC)848158096  |z (OCoLC)964891456  |z (OCoLC)985056212  |z (OCoLC)1005775642  |z (OCoLC)1027303968  |z (OCoLC)1058271958  |z (OCoLC)1066633319  |z (OCoLC)1081199772 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d YDXCP  |d ZMC  |d COO  |d NUI  |d OCLCF  |d BEDGE  |d NLGGC  |d SFB  |d OCLCO  |d AU@  |d OHX  |d BWX  |d BTCTA  |d OCL  |d OCLCO  |d OCLCQ  |d VT2  |d ESU  |d IOG  |d NJR  |d OCLCA  |d BUF  |d REB  |d CEF  |d U3W  |d OCLCO  |d OCLCQ  |d EBLCP  |d WYU  |d YOU  |d UWO  |d TKN  |d OCLCQ  |d LEAUB  |d OCLCQ  |d OCLCO  |d OCLCQ  |d WURST  |d LUN  |d OCLCQ  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
049 |a COM6 
050 4 |a QA76.9.A25  |b W57 2012 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 005.8/2  |2 23 
084 |a 54.62  |2 bcl 
084 |a 54.32  |2 bcl 
111 2 |a WISA 2012  |d (2012 :  |c Cheju Island, Korea) 
245 1 0 |a Information security applications :  |b 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised selected papers /  |c Dong Hoon Lee, Moti Yung (eds.). 
246 3 |a WISA 2012. 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2012. 
264 1 |a Berlin ;  |a New York :  |b Springer,  |c [2012] 
264 4 |c ©2012. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file. 
347 |b PDF. 
490 1 |a Lecture notes in computer science ;  |v 7690. 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology. 
505 0 0 |t Security on LBlock against Biclique Cryptanalysis /  |r Yanfeng Wang, Wenling Wu, Xiaoli Yu and Lei Zhang --  |t Improved Impossible Differential Attacks on Reduced-Round MISTY1 /  |r Keting Jia and Leibo Li --  |t Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs /  |r Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng and Kouichi Sakurai --  |t Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity /  |r Wentao Zhao, Xin Hai, Shaojing Fu, Chao Li and Yanfeng Wang --  |t Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors /  |r Hwajeong Seo and Howon Kim --  |t Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumption /  |r Hyunmin Kim, Vladimir Rozic and Ingrid Verbauwhede --  |t Improved Differential Fault Analysis on Block Cipher ARIA /  |r JeaHoon Park and JaeCheol Ha --  |t Multi-Level Controlled Signature /  |r Pairat Thorncharoensri, Willy Susilo and Yi Mu --  |t Tate Pairing Computation on Generalized Hessian Curves /  |r Liangze Li and Fan Zhang. 
505 8 0 |t Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model /  |r Mario Larangeira and Keisuke Tanaka --  |t An Authentication and Key Management Scheme for the Proxy Mobile IPv6 /  |r Hyun-Sun Kang and Chang-Seop Park --  |t Payment Approval for PayWord /  |r László Aszalós and Andrea Huszti --  |t Anonymity-Based Authenticated Key Agreement with Full Binding Property /  |r Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee and DaeHun Nyang --  |t A Study for Classification of Web Browser Log and Timeline Visualization /  |r Junghoon Oh, Namheun Son, Sangjin Lee and Kyungho Lee --  |t Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions /  |r François Durvaux, Benoît Gérard, Stéphanie Kerckhof, François Koeune and François-Xavier Standaert --  |t N-Victims: An Approach to Determine N-Victims for APT Investigations /  |r Shun-Te Liu, Yi-Ming Chen and Hui-Ching Hung --  |t An Efficient Filtering Method for Detecting Malicous Web Pages /  |r Jaeun Choi, Gisung Kim, Tae Ghyoon Kim and Sehun Kim. 
505 8 0 |t Lightweight Client-Side Methods for Detecting Email Forgery /  |r Eric Lin, John Aycock and Mohammad Mannan --  |t AIGG Threshold Based HTTP GET Flooding Attack Detection /  |r Yang-seo Choi, Ik-Kyun Kim, Jin-Tae Oh and Jong-Soo Jang --  |t Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks /  |r Hyunjoo Kim, Byoungkoo Kim, Daewon Kim, Ik-Kyun Kim and Tai-Myoung Chung --  |t Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice /  |r Rasheed Hussain, Sangjin Kim and Heekuck Oh --  |t On Trigger Detection against Reactive Jamming Attacks: A Localized Solution /  |r Incheol Shin, Sinkyu Kim and Jungtaek Seo --  |t Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs /  |r Yu-Chih Wei and Yi-Ming Chen --  |t A Trust Management Model for QoS-Based Service Selection /  |r Yukyong Kim and Kyung-Goo Doh --  |t Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems /  |r Haklin Kimm and Norkee Sherpa. 
588 0 |a Print version record. 
520 |a This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security. 
504 |a Includes bibliographical references and index. 
546 |a English. 
650 0 |a Data encryption (Computer science)  |v Congresses. 
650 0 |a Computer networks  |x Security measures  |v Congresses. 
650 0 |a Computer security  |v Congresses. 
650 0 |a Database security  |v Congresses. 
650 6 |a Chiffrement (Informatique)  |v Congrès. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Congrès. 
650 6 |a Sécurité informatique  |v Congrès. 
650 6 |a Bases de données  |x Sécurité  |x Mesures  |v Congrès. 
650 7 |a Informatique.  |2 eclas. 
650 7 |a Computer networks  |x Security measures.  |2 fast. 
650 7 |a Computer security.  |2 fast. 
650 7 |a Data encryption (Computer science)  |2 fast. 
650 7 |a Database security.  |2 fast. 
653 0 0 |a computerwetenschappen. 
653 0 0 |a computer sciences. 
653 0 0 |a informatiesystemen. 
653 0 0 |a information systems. 
653 0 0 |a internet. 
653 0 0 |a algoritmen. 
653 0 0 |a algorithms. 
653 0 0 |a computeranalyse. 
653 0 0 |a computer analysis. 
653 0 0 |a gegevensbeheer. 
653 0 0 |a data management. 
653 0 0 |a computernetwerken. 
653 0 0 |a computer networks. 
653 1 0 |a Information and Communication Technology (General) 
653 1 0 |a Informatie- en communicatietechnologie (algemeen) 
655 2 |a Congress. 
655 7 |a proceedings (reports)  |2 aat. 
655 7 |a Conference papers and proceedings.  |2 fast. 
655 7 |a Software.  |2 lcgft. 
655 7 |a Conference papers and proceedings.  |2 lcgft. 
655 7 |a Actes de congrès.  |2 rvmgf. 
700 1 |a Lee, Dong Hoon. 
700 1 |a Yung, Moti. 
710 2 |a SpringerLink (Online service) 
776 0 8 |i Print version:  |t Information security applications.  |d [S.l.] : Springer, 2012  |z 3642354157  |w (OCoLC)818734653. 
830 0 |a Lecture notes in computer science ;  |v 7690. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology. 
907 |a .b37702683  |b multi  |c -  |d 130108  |e 240401 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g gw   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comprehensive, in 2023.06 
948 |a MARCIVE Comp, in 2022.12 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE Comp, 2017.10 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
933 |a Marcive found issue: "111 2   |a WISA 2012  |d (2012 :  |c Cheju Island, Korea)" 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2023.06 
995 |a Loaded with m2btab.ltiac in 2022.12 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.10 
995 |a Loaded with m2btab.ltiac in 2017.08 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a OCLC offline update by CMU 
995 |a Loaded with m2btab.auth in 2021.07 
995 |a Loaded with m2btab.auth in 2024.03 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150329659  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-642-35416-8  |3 SpringerLink  |z Click here for access