Information Security Applications

16th International Workshop, WISA 2015, Jeju Island, Korea, August 20–22, 2015, Revised Selected Papers

  • Ho-won Kim
  • Dooho Choi
Conference proceedings WISA 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9503)

Also part of the Security and Cryptology book sub series (LNSC, volume 9503)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Hardware Security

    1. Front Matter
      Pages 1-1
    2. Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin
      Pages 3-15
    3. Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim
      Pages 28-40
    4. Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
      Pages 41-53
    5. Hyeokchan Kwon, Kwang-Il Lee, Gaeil An, Byung-Ho Chung, Jeong-Nyeo Kim
      Pages 54-61
  3. Cryptography

    1. Front Matter
      Pages 63-63
    2. You Sung Kang, Elizabeth O’Sullivan, Dooho Choi, Maire O’Neill
      Pages 65-74
    3. Renzhang Liu, Yanbin Pan
      Pages 87-95
    4. Hyun Sook Rhee, Dong Hoon Lee
      Pages 96-109
    5. Seira Hidano, Shinsaku Kiyomoto
      Pages 110-121
    6. Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee
      Pages 122-133
    7. Binh P. Nguyen, Hoa Ngo, Jihun Kim, Jong Kim
      Pages 134-145
  4. Side Channel Attacks and Countermeasures

    1. Front Matter
      Pages 159-159
    2. Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi et al.
      Pages 161-173
    3. Hyunjin Ahn, Neil Hanley, Maire O’Neill, Dong-Guk Han
      Pages 174-186
  5. Security and Threat Analysis

    1. Front Matter
      Pages 213-213
    2. Hwajeong Seo, Zhe Liu, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim
      Pages 215-226
    3. Dongkwan Kim, Suwan Park, Kibum Choi, Yongdae Kim
      Pages 227-239
    4. Hocheol Shin, Kibum Choi, Youngseok Park, Jaeyeong Choi, Yongdae Kim
      Pages 240-253
  6. IoT Security

    1. Front Matter
      Pages 267-267
    2. Hyeokjin Kwon, Jiye Park, Namhi Kang
      Pages 269-280
    3. Jungsoo Park, Jinouk Kim, Minho Park, Souhwan Jung
      Pages 281-287
    4. Kibum Choi, Yunmok Son, Jangjun Lee, Suryeon Kim, Yongdae Kim
      Pages 300-312
    5. Mahmoud El-Hadidi, Hany El-Sayed, Heba Aslan, Karim Osama
      Pages 313-325
    6. Guifang Huang, Hongda Li
      Pages 326-335
  7. Network Security

  8. Application Security

    1. Front Matter
      Pages 371-371
    2. Hiroya Susuki, Rie Shigetomi Yamaguchi
      Pages 373-385
    3. Se Hwan Kim, Yonggon Kim, Ohmin Kwon, Hyunsoo Yoon
      Pages 386-398
    4. Paal E. Engelstad, Hugo Hammer, Kyrre Wahl Kongsgård, Anis Yazidi, Nils Agne Nordbotten, Aleksander Bai
      Pages 399-410
    5. Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon
      Pages 411-422
  9. Back Matter
    Pages 437-438

About these proceedings


This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015.

The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections such as hardware security; cryptography, side channel attacks and countermeasures; security and threat analysis; IoT security; network security; cryptography; application security.


Application security Cryptography Cyber security Hardware security Network security Black-box system Cryptography Deep learning DoS attack detection Hash functions IoT security Machine learning Malware communication Multi-layer security RFID Side channel attack Side-channel attack User authentication Wearable devices Wireless sensor networks

Editors and affiliations

  • Ho-won Kim
    • 1
  • Dooho Choi
    • 2
  1. 1.Pusan National UniversityBusanKorea (Republic of)
  2. 2.Electronics and Telecommunications Research InstituteDaejeonKorea (Republic of)

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-31874-5
  • Online ISBN 978-3-319-31875-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software