Information security applications 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised selected papers /
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and select...
Corporate Authors: | WISA 2012 Cheju Island, Korea) |
---|---|
Other Authors: | WISA 2012, Lee, Dong Hoon., Yung, Moti., SpringerLink (Online service) |
Format: | eBook |
Language: | English |
Published: |
Berlin ; New York :
Springer,
©2012.
Berlin ; New York : [2012] |
Physical Description: |
1 online resource. |
Series: |
Lecture notes in computer science ;
7690. LNCS sublibrary. Security and cryptology. |
Subjects: |
LEADER | 09507cam a2201393 a 4500 | ||
---|---|---|---|
001 | 820026024 | ||
003 | OCoLC | ||
005 | 20240223121953.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 121203s2012 gw ob 101 0 eng d | ||
019 | |a 818734653 |a 818736009 |a 818827385 |a 848158096 |a 964891456 |a 985056212 |a 1005775642 |a 1027303968 |a 1058271958 |a 1066633319 |a 1081199772 | ||
020 | |a 9783642354168 |q (electronic bk.) | ||
020 | |a 3642354165 |q (electronic bk.) | ||
020 | |a 3642354157 | ||
020 | |a 9783642354151 | ||
020 | |z 9783642354151 | ||
024 | 7 | |a 10.1007/978-3-642-35416-8 |2 doi | |
035 | |a (OCoLC)820026024 |z (OCoLC)818734653 |z (OCoLC)818736009 |z (OCoLC)818827385 |z (OCoLC)848158096 |z (OCoLC)964891456 |z (OCoLC)985056212 |z (OCoLC)1005775642 |z (OCoLC)1027303968 |z (OCoLC)1058271958 |z (OCoLC)1066633319 |z (OCoLC)1081199772 | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d YDXCP |d ZMC |d COO |d NUI |d OCLCF |d BEDGE |d NLGGC |d SFB |d OCLCO |d AU@ |d OHX |d BWX |d BTCTA |d OCL |d OCLCO |d OCLCQ |d VT2 |d ESU |d IOG |d NJR |d OCLCA |d BUF |d REB |d CEF |d U3W |d OCLCO |d OCLCQ |d EBLCP |d WYU |d YOU |d UWO |d TKN |d OCLCQ |d LEAUB |d OCLCQ |d OCLCO |d OCLCQ |d WURST |d LUN |d OCLCQ |d UKAHL |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
049 | |a COM6 | ||
050 | 4 | |a QA76.9.A25 |b W57 2012 | |
072 | 7 | |a UKN |2 bicssc | |
072 | 7 | |a COM075000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8/2 |2 23 |
084 | |a 54.62 |2 bcl | ||
084 | |a 54.32 |2 bcl | ||
111 | 2 | |a WISA 2012 |d (2012 : |c Cheju Island, Korea) | |
245 | 1 | 0 | |a Information security applications : |b 13th international workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised selected papers / |c Dong Hoon Lee, Moti Yung (eds.). |
246 | 3 | |a WISA 2012. | |
260 | |a Berlin ; |a New York : |b Springer, |c ©2012. | ||
264 | 1 | |a Berlin ; |a New York : |b Springer, |c [2012] | |
264 | 4 | |c ©2012. | |
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
347 | |a text file. | ||
347 | |b PDF. | ||
490 | 1 | |a Lecture notes in computer science ; |v 7690. | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology. | |
505 | 0 | 0 | |t Security on LBlock against Biclique Cryptanalysis / |r Yanfeng Wang, Wenling Wu, Xiaoli Yu and Lei Zhang -- |t Improved Impossible Differential Attacks on Reduced-Round MISTY1 / |r Keting Jia and Leibo Li -- |t Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs / |r Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng and Kouichi Sakurai -- |t Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity / |r Wentao Zhao, Xin Hai, Shaojing Fu, Chao Li and Yanfeng Wang -- |t Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors / |r Hwajeong Seo and Howon Kim -- |t Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumption / |r Hyunmin Kim, Vladimir Rozic and Ingrid Verbauwhede -- |t Improved Differential Fault Analysis on Block Cipher ARIA / |r JeaHoon Park and JaeCheol Ha -- |t Multi-Level Controlled Signature / |r Pairat Thorncharoensri, Willy Susilo and Yi Mu -- |t Tate Pairing Computation on Generalized Hessian Curves / |r Liangze Li and Fan Zhang. |
505 | 8 | 0 | |t Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model / |r Mario Larangeira and Keisuke Tanaka -- |t An Authentication and Key Management Scheme for the Proxy Mobile IPv6 / |r Hyun-Sun Kang and Chang-Seop Park -- |t Payment Approval for PayWord / |r László Aszalós and Andrea Huszti -- |t Anonymity-Based Authenticated Key Agreement with Full Binding Property / |r Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee and DaeHun Nyang -- |t A Study for Classification of Web Browser Log and Timeline Visualization / |r Junghoon Oh, Namheun Son, Sangjin Lee and Kyungho Lee -- |t Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions / |r François Durvaux, Benoît Gérard, Stéphanie Kerckhof, François Koeune and François-Xavier Standaert -- |t N-Victims: An Approach to Determine N-Victims for APT Investigations / |r Shun-Te Liu, Yi-Ming Chen and Hui-Ching Hung -- |t An Efficient Filtering Method for Detecting Malicous Web Pages / |r Jaeun Choi, Gisung Kim, Tae Ghyoon Kim and Sehun Kim. |
505 | 8 | 0 | |t Lightweight Client-Side Methods for Detecting Email Forgery / |r Eric Lin, John Aycock and Mohammad Mannan -- |t AIGG Threshold Based HTTP GET Flooding Attack Detection / |r Yang-seo Choi, Ik-Kyun Kim, Jin-Tae Oh and Jong-Soo Jang -- |t Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks / |r Hyunjoo Kim, Byoungkoo Kim, Daewon Kim, Ik-Kyun Kim and Tai-Myoung Chung -- |t Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice / |r Rasheed Hussain, Sangjin Kim and Heekuck Oh -- |t On Trigger Detection against Reactive Jamming Attacks: A Localized Solution / |r Incheol Shin, Sinkyu Kim and Jungtaek Seo -- |t Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs / |r Yu-Chih Wei and Yi-Ming Chen -- |t A Trust Management Model for QoS-Based Service Selection / |r Yukyong Kim and Kyung-Goo Doh -- |t Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems / |r Haklin Kimm and Norkee Sherpa. |
588 | 0 | |a Print version record. | |
520 | |a This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security. | ||
504 | |a Includes bibliographical references and index. | ||
546 | |a English. | ||
650 | 0 | |a Data encryption (Computer science) |v Congresses. | |
650 | 0 | |a Computer networks |x Security measures |v Congresses. | |
650 | 0 | |a Computer security |v Congresses. | |
650 | 0 | |a Database security |v Congresses. | |
650 | 6 | |a Chiffrement (Informatique) |v Congrès. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |v Congrès. | |
650 | 6 | |a Sécurité informatique |v Congrès. | |
650 | 6 | |a Bases de données |x Sécurité |x Mesures |v Congrès. | |
650 | 7 | |a Informatique. |2 eclas. | |
650 | 7 | |a Computer networks |x Security measures. |2 fast. | |
650 | 7 | |a Computer security. |2 fast. | |
650 | 7 | |a Data encryption (Computer science) |2 fast. | |
650 | 7 | |a Database security. |2 fast. | |
653 | 0 | 0 | |a computerwetenschappen. |
653 | 0 | 0 | |a computer sciences. |
653 | 0 | 0 | |a informatiesystemen. |
653 | 0 | 0 | |a information systems. |
653 | 0 | 0 | |a internet. |
653 | 0 | 0 | |a algoritmen. |
653 | 0 | 0 | |a algorithms. |
653 | 0 | 0 | |a computeranalyse. |
653 | 0 | 0 | |a computer analysis. |
653 | 0 | 0 | |a gegevensbeheer. |
653 | 0 | 0 | |a data management. |
653 | 0 | 0 | |a computernetwerken. |
653 | 0 | 0 | |a computer networks. |
653 | 1 | 0 | |a Information and Communication Technology (General) |
653 | 1 | 0 | |a Informatie- en communicatietechnologie (algemeen) |
655 | 2 | |a Congress. | |
655 | 7 | |a proceedings (reports) |2 aat. | |
655 | 7 | |a Conference papers and proceedings. |2 fast. | |
655 | 7 | |a Software. |2 lcgft. | |
655 | 7 | |a Conference papers and proceedings. |2 lcgft. | |
655 | 7 | |a Actes de congrès. |2 rvmgf. | |
700 | 1 | |a Lee, Dong Hoon. | |
700 | 1 | |a Yung, Moti. | |
710 | 2 | |a SpringerLink (Online service) | |
776 | 0 | 8 | |i Print version: |t Information security applications. |d [S.l.] : Springer, 2012 |z 3642354157 |w (OCoLC)818734653. |
830 | 0 | |a Lecture notes in computer science ; |v 7690. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
907 | |a .b37702683 |b multi |c - |d 130108 |e 240401 | ||
998 | |a (3)cue |a cu |b 240227 |c m |d z |e - |f eng |g gw |h 0 |i 2 | ||
948 | |a MARCIVE Overnight, in 2024.03 | ||
948 | |a MARCIVE Comprehensive, in 2023.06 | ||
948 | |a MARCIVE Comp, in 2022.12 | ||
948 | |a MARCIVE Over, 07/2021 | ||
948 | |a MARCIVE Comp, 2019.12 | ||
948 | |a MARCIVE Comp, 2018.05 | ||
948 | |a MARCIVE Comp, 2017.10 | ||
948 | |a MARCIVE August, 2017 | ||
948 | |a MARCIVE extract Aug 5, 2017 | ||
933 | |a Marcive found issue: "111 2 |a WISA 2012 |d (2012 : |c Cheju Island, Korea)" | ||
994 | |a 92 |b COM | ||
995 | |a Loaded with m2btab.ltiac in 2024.03 | ||
995 | |a Loaded with m2btab.elec in 2024.02 | ||
995 | |a Loaded with m2btab.ltiac in 2023.06 | ||
995 | |a Loaded with m2btab.ltiac in 2022.12 | ||
995 | |a Loaded with m2btab.ltiac in 2021.07 | ||
995 | |a Loaded with m2btab.elec in 2021.06 | ||
995 | |a Loaded with m2btab.ltiac in 2019.12 | ||
995 | |a Loaded with m2btab.ltiac in 2018.06 | ||
995 | |a Loaded with m2btab.ltiac in 2017.10 | ||
995 | |a Loaded with m2btab.ltiac in 2017.08 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a OCLC offline update by CMU | ||
995 | |a Loaded with m2btab.auth in 2021.07 | ||
995 | |a Loaded with m2btab.auth in 2024.03 | ||
999 | |e z | ||
999 | |a cue | ||
989 | |d cueme |e - - |f - - |g - |h 0 |i 0 |j 200 |k 240227 |l $0.00 |m |n - - |o - |p 0 |q 0 |t 0 |x 0 |w SpringerLink |1 .i150329659 |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-642-35416-8 |3 SpringerLink |z Click here for access |