Advertisement

Information Security Applications

18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers

  • Brent ByungHoon Kang
  • Taesoo Kim
Conference proceedings WISA 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10763)

Also part of the Security and Cryptology book sub series (LNSC, volume 10763)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Attack and Defense I

    1. Front Matter
      Pages 1-1
    2. Hwajeong Seo, Taehwan Park, Janghyun Ji, Howon Kim
      Pages 3-15
    3. Jong-Uk Hou, Han-Ul Jang, Jin-Seok Park, Heung-Kyu Lee
      Pages 16-24
    4. Jong-Uk Hou, In-Jae Yu, Hyun-Ji Song, Heung-Kyu Lee
      Pages 25-35
  3. Theory in Security

    1. Front Matter
      Pages 37-37
    2. Jingguo Bi, Mingqiang Wang, Wei Wei
      Pages 51-60
    3. Mahdi Daghmehchi Firoozjaei, Sang Min Lee, Hyoungshick Kim
      Pages 61-71
    4. Hwajeong Seo, Taehwan Park, Janghyun Ji, Zhi Hu, Howon Kim
      Pages 72-84
  4. Web Security and Emerging Technologies

    1. Front Matter
      Pages 85-85
    2. Joon Young Park, Jong Pil Yun, Dong Hoon Lee
      Pages 87-100
    3. Minsu Lee, Hyungu Lee, Ji Sun Shin
      Pages 101-111
  5. Systems Security and Authentication

    1. Front Matter
      Pages 113-113
    2. Jae Hyeon Woo, Moosung Park, Kyungho Lee
      Pages 127-136
    3. Jonathan Grimm, Irfan Ahmed, Vassil Roussev, Manish Bhatt, ManPyo Hong
      Pages 137-149
    4. Jungwoo Joh, Yezee Seo, Hoon-Kyu Kim, Taekyoung Kwon
      Pages 150-161
    5. Kwon-Jin Yoon, Jaehyeon Yoon, Souhwan Jung
      Pages 162-172
    6. Momoka Kasuya, Kazuo Sakiyama
      Pages 173-183
    7. Vanesco A. J. Boehm, Jong Kim, James Won-Ki Hong
      Pages 184-195
  6. Attack and Defense II and Network Security

    1. Front Matter
      Pages 197-197
    2. Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka
      Pages 199-211
  7. Crypto Protocols

    1. Front Matter
      Pages 247-247
    2. Hyunki Kim, Jaehoon Lee, Okyeon Yi
      Pages 274-282
    3. Taehwan Park, Hwajeong Seo, Garam Lee, Md. Al-Amin Khandaker, Yasuyuki Nogami, Howon Kim
      Pages 283-294
  8. Attact Detections and Legal Aspects

  9. Back Matter
    Pages 337-338

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017.
The 12 revised full papers and 15 short papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections such as attack and defense; theory in security; web security and emerging technologies; systems security and authentication; crypto protocols; and attack detections and legal aspects.

Keywords

Analysis of network and security protocol Authentication and authorization Botnet defense Critical infrastructure security Digital forensics Embedded systems security Hardware and physical security Malware analysis Network-based attacks Security policy Web Security data security cryptography authentication computer networks computer crime telecommunication networks public key cryptography internet signal processsing

Editors and affiliations

  1. 1.KAISTDaejeonKorea (Republic of)
  2. 2.Georgia Institute of TechnologyAtlantaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-93563-8
  • Copyright Information Springer International Publishing AG, part of Springer Nature 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-93562-1
  • Online ISBN 978-3-319-93563-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering