© 2016

Information Security Applications

16th International Workshop, WISA 2015, Jeju Island, Korea, August 20–22, 2015, Revised Selected Papers

  • Ho-won Kim
  • Dooho Choi
Conference proceedings WISA 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9503)

Also part of the Security and Cryptology book sub series (LNSC, volume 9503)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Hardware Security

    1. Front Matter
      Pages 1-1
    2. Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin
      Pages 3-15
    3. Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim
      Pages 28-40
    4. Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim
      Pages 41-53
    5. Hyeokchan Kwon, Kwang-Il Lee, Gaeil An, Byung-Ho Chung, Jeong-Nyeo Kim
      Pages 54-61
  3. Cryptography

    1. Front Matter
      Pages 63-63
    2. You Sung Kang, Elizabeth O’Sullivan, Dooho Choi, Maire O’Neill
      Pages 65-74
    3. Renzhang Liu, Yanbin Pan
      Pages 87-95
    4. Hyun Sook Rhee, Dong Hoon Lee
      Pages 96-109
    5. Seira Hidano, Shinsaku Kiyomoto
      Pages 110-121
    6. Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee
      Pages 122-133
    7. Binh P. Nguyen, Hoa Ngo, Jihun Kim, Jong Kim
      Pages 134-145
  4. Side Channel Attacks and Countermeasures

    1. Front Matter
      Pages 159-159
    2. Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi et al.
      Pages 161-173
    3. Hyunjin Ahn, Neil Hanley, Maire O’Neill, Dong-Guk Han
      Pages 174-186

About these proceedings


This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015.

The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections such as hardware security; cryptography, side channel attacks and countermeasures; security and threat analysis; IoT security; network security; cryptography; application security.


Application security Cryptography Cyber security Hardware security Network security Black-box system Cryptography Deep learning DoS attack detection Hash functions IoT security Machine learning Malware communication Multi-layer security RFID Side channel attack Side-channel attack User authentication Wearable devices Wireless sensor networks

Editors and affiliations

  • Ho-won Kim
    • 1
  • Dooho Choi
    • 2
  1. 1.Pusan National UniversityBusanKorea (Republic of)
  2. 2.Electronics and Telecommunications Research InstituteDaejeonKorea (Republic of)

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment