Advertisement

Information Security Applications

17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers

  • Dooho Choi
  • Sylvain Guilley
Conference proceedings WISA 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10144)

Also part of the Security and Cryptology book sub series (LNSC, volume 10144)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Aziz Mohaisen, Ah Reum Kang, Kui Ren
    Pages 1-14
  3. An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen
    Pages 15-28
  4. Xinyu Liu, Beumjin Cho, Jong Kim
    Pages 29-41
  5. Jongseok Choi, Jong-gyu Park, Shinwook Heo, Namje Park, Howon Kim
    Pages 42-53
  6. Seunghun Cha, Hyoungshick Kim
    Pages 54-65
  7. Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai
    Pages 79-89
  8. Su-kyung Kown, Bongsoo Jang, Byoung-Dai Lee, Younghae Do, Hunki Baek, Yoon-Ho Choi
    Pages 90-101
  9. Jeong Yoon Yang, So Jeong Kim, Il Seok Oh(Luke)
    Pages 102-111
  10. Jongmin Jeong, Hyunsoo Kwon, Hyungjune Shin, Junbeom Hur
    Pages 112-123
  11. Yujin Kwon, Dohyun Kim, Yunmok Son, Jaeyeong Choi, Yongdae Kim
    Pages 124-135
  12. Muhamad Erza Aminanto, Kwangjo Kim
    Pages 136-147
  13. Hyunwook Hong, Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee et al.
    Pages 148-160
  14. Matthew Ruffell, Jin B. Hong, Hyoungshick Kim, Dong Seong Kim
    Pages 161-173
  15. Sanghak Oh, Eunsoo Kim, Hyoungshick Kim
    Pages 174-185
  16. P. N. Giao, Suk-Hwan Lee, Kwang-Seok Moon, Ki-Ryong Kwon
    Pages 210-220
  17. Md. Al-Amin Khandaker, Yasuyuki Nogami, Hwajeong Seo, Sylvain Duquesne
    Pages 221-232
  18. Xiaoqi Yu, Nairen Cao, Gongxian Zeng, Ruoqing Zhang, Siu-Ming Yiu
    Pages 233-244
  19. Jean-Charles Faugère, Ludovic Perret
    Pages 258-266
  20. Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko, Kenichi Higuchi
    Pages 267-279
  21. Maciej Skorski
    Pages 280-291
  22. Stjepan Picek
    Pages 305-317
  23. Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu et al.
    Pages 318-330
  24. Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Lu Zhou et al.
    Pages 331-340
  25. Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod
    Pages 341-352
  26. Simon S. Woo, Jingul Kim, Duoduo Yu, Beomjun Kim
    Pages 353-365
  27. Sung-Hoon Lee, Jong-Hyuk Roh, Soohyung Kim, Seung-Hun Jin
    Pages 366-375
  28. Seung-hee Oh, Byung-gil Lee, Byungho Chung
    Pages 388-396
  29. Back Matter
    Pages 397-398

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016.

The 31 revised full papers including two invited talks presented in this volume were carefully reviewed and  selected from 61 submissions. The papers are organized in topical sections such as network security, threat analysis, application security, cryptographic. Protocols,  cryptanalysis, cryptographic implementations, authentication using bio and ML, authentication, ICT Convergent security

Keywords

biometrics cyber security embedded system security and privacy Web security artificial neural networ authentication cellular networks cryptolotgy data encryption database and storage security evolutionary computation machine learning network security public key cryptography soft computing software and application security systems and data security systems security

Editors and affiliations

  • Dooho Choi
    • 1
  • Sylvain Guilley
    • 2
  1. 1.ETRIDaejeonKorea (Republic of)
  2. 2.Secure-IC, S.A.S.ParisFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-56549-1
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-56548-4
  • Online ISBN 978-3-319-56549-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site