Skip to main content
  • Conference proceedings
  • © 2016

Information Security Applications

16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9503)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISA: International Conference on Information Security Applications

Conference proceedings info: WISA 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (35 papers)

  1. Side Channel Attacks and Countermeasures

  2. Security and Threat Analysis

    1. Front Matter

      Pages 213-213
    2. Open Sesame! Hacking the Password

      • Hwajeong Seo, Zhe Liu, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim
      Pages 215-226
    3. BurnFit: Analyzing and Exploiting Wearable Devices

      • Dongkwan Kim, Suwan Park, Kibum Choi, Yongdae Kim
      Pages 227-239
    4. Security Analysis of FHSS-type Drone Controller

      • Hocheol Shin, Kibum Choi, Youngseok Park, Jaeyeong Choi, Yongdae Kim
      Pages 240-253
  3. IoT Security

    1. Front Matter

      Pages 267-267
    2. Challenges in Deploying CoAP Over DTLS in Resource Constrained Environments

      • Hyeokjin Kwon, Jiye Park, Namhi Kang
      Pages 269-280
    3. A Study of OAuth 2.0 Risk Notification and Token Revocation from Resource Server

      • Jungsoo Park, Jinouk Kim, Minho Park, Souhwan Jung
      Pages 281-287
    4. Frying PAN: Dissecting Customized Protocol for Personal Area Network

      • Kibum Choi, Yunmok Son, Jangjun Lee, Suryeon Kim, Yongdae Kim
      Pages 300-312
    5. Structured Design Approach for an Optimal Programmable Synchronous Security Processor

      • Mahmoud El-Hadidi, Hany El-Sayed, Heba Aslan, Karim Osama
      Pages 313-325
    6. On Zero Knowledge Argument with PQT Soundness

      • Guifang Huang, Hongda Li
      Pages 326-335
  4. Network Security

    1. Front Matter

      Pages 337-337
  5. Application Security

    1. Front Matter

      Pages 371-371
    2. Cost-Effective Modeling for Authentication and Its Application to Activity Tracker

      • Hiroya Susuki, Rie Shigetomi Yamaguchi
      Pages 373-385
    3. Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree

      • Se Hwan Kim, Yonggon Kim, Ohmin Kwon, Hyunsoo Yoon
      Pages 386-398

Other Volumes

  1. Information Security Applications

About this book

This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015.

The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections such as hardware security; cryptography, side channel attacks and countermeasures; security and threat analysis; IoT security; network security; cryptography; application security.

Editors and Affiliations

  • Pusan National University, Busan, Korea (Republic of)

    Ho-won Kim

  • Electronics and Telecommunications Research Institute, Daejeon, Korea (Republic of)

    Dooho Choi

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access