skip to content
Information Security Applications : 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers Preview this item
ClosePreview this item
Checking...

Information Security Applications : 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers

Author: Dong Hoon Lee; Moti Yung
Publisher: Berlin, Heidelberg : Springer, 2012.
Series: Lecture notes in computer science, 7690.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Publication:Information security applications.
Summary:
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Dong Hoon Lee; Moti Yung
ISBN: 9783642354168 3642354165 3642354157 9783642354151
OCLC Number: 824650804
Description: 1 Online-Ressource (XII, 371 Seiten 135 Illustrationen, digital).
Contents: PSecurity on LBlock against Biclique Cryptanalysis --
Improved Impossible Differential Attacks on Reduced-Round MISTY1.-Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.-Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity.-Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.-Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumption.-Improved Differential Fault Analysis on Block Cipher ARIA.-Multi-Level Controlled Signature.-Tate Pairing Computation on Generalized Hessian Curves --
Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model.-An Authentication and Key Management Scheme for the Proxy Mobile IPv6.-Payment Approval for PayWord --
Anonymity-Based Authenticated Key Agreement with Full Binding Property.-A Study for Classification of Web Browser Log and Timeline Visualization.-Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions.-N-Victims: An Approach to Determine N-Victims for APT Investigations.-An Efficient Filtering Method for Detecting Malicous Web Pages.-Lightweight Client-Side Methods for Detecting Email Forgery.-AIGG Threshold Based HTTP GET Flooding Attack Detection.-Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks.-Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice.-On Trigger Detection against Reactive Jamming Attacks: A Localized Solution.-Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs.-A Trust Management Model for QoS-Based Service Selection.-Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems./p.
Series Title: Lecture notes in computer science, 7690.
Responsibility: edited by Dong Hoon Lee, Moti Yung.

Abstract:

This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/824650804> # Information Security Applications : 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "824650804" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/4929635553#Place/berlin_heidelberg> ; # Berlin, Heidelberg
    schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
    schema:about <http://id.worldcat.org/fast/872451> ; # Computer science
    schema:about <http://experiment.worldcat.org/entity/work/data/4929635553#Topic/data_encryption> ; # Data Encryption
    schema:about <http://experiment.worldcat.org/entity/work/data/4929635553#Topic/systems_and_data_security> ; # Systems and Data Security
    schema:about <http://id.worldcat.org/fast/872527> ; # Computer software
    schema:about <http://dewey.info/class/004.6/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4929635553#Topic/computer_communication_networks> ; # Computer Communication Networks
    schema:about <http://experiment.worldcat.org/entity/work/data/4929635553#Topic/management_of_computing_and_information_systems> ; # Management of Computing and Information Systems
    schema:about <http://experiment.worldcat.org/entity/work/data/4929635553#Topic/computer_science> ; # Computer Science
    schema:about <http://experiment.worldcat.org/entity/work/data/4929635553#Topic/algorithm_analysis_and_problem_complexity> ; # Algorithm Analysis and Problem Complexity
    schema:about <http://experiment.worldcat.org/entity/work/data/4929635553#Topic/information_systems> ; # Information Systems
    schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
    schema:about <http://experiment.worldcat.org/entity/work/data/4929635553#Topic/information_systems_applications> ; # Information Systems Applications
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/12562641> ; # Moti Yung
    schema:creator <http://viaf.org/viaf/36324011> ; # Dong Hoon Lee
    schema:datePublished "2012" ;
    schema:description "This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security." ;
    schema:description "PSecurity on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks on Reduced-Round MISTY1.-Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.-Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity.-Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.-Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumption.-Improved Differential Fault Analysis on Block Cipher ARIA.-Multi-Level Controlled Signature.-Tate Pairing Computation on Generalized Hessian Curves -- Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model.-An Authentication and Key Management Scheme for the Proxy Mobile IPv6.-Payment Approval for PayWord -- Anonymity-Based Authenticated Key Agreement with Full Binding Property.-A Study for Classification of Web Browser Log and Timeline Visualization.-Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions.-N-Victims: An Approach to Determine N-Victims for APT Investigations.-An Efficient Filtering Method for Detecting Malicous Web Pages.-Lightweight Client-Side Methods for Detecting Email Forgery.-AIGG Threshold Based HTTP GET Flooding Attack Detection.-Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks.-Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice.-On Trigger Detection against Reactive Jamming Attacks: A Localized Solution.-Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs.-A Trust Management Model for QoS-Based Service Selection.-Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems./p." ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4929635553> ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/4929635553#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
    schema:name "Information Security Applications : 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers" ;
    schema:productID "824650804" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/824650804#PublicationEvent/berlin_heidelberg_springer_2012> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/4929635553#Agent/springer> ; # Springer
    schema:url <http://swbplus.bsz-bw.de/bsz376063556cov.htm> ;
    schema:url <http://dx.doi.org/10.1007/978-3-642-35416-8> ;
    schema:url <https://doi.org/10.1007/978-3-642-35416-8> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-642-35416-8> ;
    schema:workExample <http://worldcat.org/isbn/9783642354151> ;
    schema:workExample <http://worldcat.org/isbn/9783642354168> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/824650804> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4929635553#Place/berlin_heidelberg> # Berlin, Heidelberg
    a schema:Place ;
    schema:name "Berlin, Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/4929635553#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/824650804> ; # Information Security Applications : 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture Notes in Computer Science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/4929635553#Topic/algorithm_analysis_and_problem_complexity> # Algorithm Analysis and Problem Complexity
    a schema:Intangible ;
    schema:name "Algorithm Analysis and Problem Complexity" ;
    .

<http://experiment.worldcat.org/entity/work/data/4929635553#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
    schema:name "Computer Communication Networks" ;
    .

<http://experiment.worldcat.org/entity/work/data/4929635553#Topic/information_systems> # Information Systems
    a schema:Intangible ;
    schema:name "Information Systems" ;
    .

<http://experiment.worldcat.org/entity/work/data/4929635553#Topic/information_systems_applications> # Information Systems Applications
    a schema:Intangible ;
    schema:name "Information Systems Applications" ;
    .

<http://experiment.worldcat.org/entity/work/data/4929635553#Topic/management_of_computing_and_information_systems> # Management of Computing and Information Systems
    a schema:Intangible ;
    schema:name "Management of Computing and Information Systems" ;
    .

<http://experiment.worldcat.org/entity/work/data/4929635553#Topic/systems_and_data_security> # Systems and Data Security
    a schema:Intangible ;
    schema:name "Systems and Data Security" ;
    .

<http://id.worldcat.org/fast/872451> # Computer science
    a schema:Intangible ;
    schema:name "Computer science" ;
    .

<http://id.worldcat.org/fast/872527> # Computer software
    a schema:Intangible ;
    schema:name "Computer software" ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)" ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
    schema:name "Data protection" ;
    .

<http://viaf.org/viaf/12562641> # Moti Yung
    a schema:Person ;
    schema:familyName "Yung" ;
    schema:givenName "Moti" ;
    schema:name "Moti Yung" ;
    .

<http://viaf.org/viaf/36324011> # Dong Hoon Lee
    a schema:Person ;
    schema:familyName "Lee" ;
    schema:givenName "Dong Hoon" ;
    schema:name "Dong Hoon Lee" ;
    .

<http://worldcat.org/isbn/9783642354151>
    a schema:ProductModel ;
    schema:isbn "3642354157" ;
    schema:isbn "9783642354151" ;
    .

<http://worldcat.org/isbn/9783642354168>
    a schema:ProductModel ;
    schema:isbn "3642354165" ;
    schema:isbn "9783642354168" ;
    .

<http://www.worldcat.org/title/-/oclc/824650804>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/824650804> ; # Information Security Applications : 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers
    schema:dateModified "2018-10-02" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.