Information Security Applications (eBook)
XIII, 386 Seiten
Springer Berlin (Verlag)
978-3-642-10838-9 (ISBN)
The 10th International Workshop on Information Security Applications (WISA 2009) was held in Busan, Korea during August 25–27, 2009. The workshop was hosted by the Korea Institute of Information Security and Cryptology (KIISC), supported by the Electronics and Telecommunications Research Institute (ETRI) and the Korea Internet and Security Agency (KISA), sponsored by the Ministry of Public Administration and Security (MoPAS) and the Korea Communications Commission (KCC), financially sponsored by the ST. Ltd. The aim of the workshop was to serve as a forum for presenting new research and experimental results in the area of information security applications from academic communities as well as from industry. The workshop program covered a wide range of security aspects, from cryptography to systems and network security and experimental work as well. It was our great pleasure and honor to serve as the Program Committee Co-chairs of WISA2009. This year, too, the proceedings of the workshop were published in the LNCS series of Springer. The WISA 2009 Program Committee received 79 papers form 16 countries. This year the submissions were exceptionally strong, and the committee accepted 27 papers for the full paper presentation track. All the papers were carefully evaluated through blind peer-review by at least three members of the Program Comm- tee. We would like to say that acceptance is a great achievement since the selection process was highly competitive, and many good papers were not accepted.
Multimedia Security.- Protecting IPTV Service Network against Malicious Rendezvous Point.- Design and Implementation of SIP-aware Security Management System.- Device Security.- Application Management Framework in User Centric Smart Card Ownership Model.- When Compromised Readers Meet RFID.- HW Implementation Security.- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?.- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment.- Applied Cryptography.- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles.- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity.- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy.- ID-Based Adaptive Oblivious Transfer.- Side Channel Attacks.- Unknown Plaintext Template Attacks.- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices.- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation.- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption.- Cryptograptanalysis.- Finding Collisions for a 45-Step Simplified HAS-V.- Non-linear Error Detection for Finite State Machines.- Quadratic Equations from a Kind of S-boxes.- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure.- Anonymity/Authentication/Access Control.- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET.- A Selectable k-Times Relaxed Anonymous Authentication Scheme.- PUF-Based Authentication Protocols – Revisited.- Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application.- Network Security.- Securing Remote Access Inside Wireless Mesh Networks.- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers.- USN Middleware Security Model.- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs.
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
---|---|
Verlagsort | Berlin |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik |
Schlagworte | Access Control • anonymity • authentication • broadcast • Calculus • Cryptanalysis • Cryptoanalysis • cryptographic protocol • cryptographic protocols • cryptography • Information Security • Logic • Network Security • privacy • Proxy • Secret Sharing • security • side channel attacks • Signatures |
ISBN-10 | 3-642-10838-5 / 3642108385 |
ISBN-13 | 978-3-642-10838-9 / 9783642108389 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich