© 2018

Information Security Applications

18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers

  • Brent ByungHoon Kang
  • Taesoo Kim
Conference proceedings WISA 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10763)

Also part of the Security and Cryptology book sub series (LNSC, volume 10763)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Attack and Defense I

    1. Front Matter
      Pages 1-1
    2. Hwajeong Seo, Taehwan Park, Janghyun Ji, Howon Kim
      Pages 3-15
    3. Jong-Uk Hou, Han-Ul Jang, Jin-Seok Park, Heung-Kyu Lee
      Pages 16-24
    4. Jong-Uk Hou, In-Jae Yu, Hyun-Ji Song, Heung-Kyu Lee
      Pages 25-35
  3. Theory in Security

    1. Front Matter
      Pages 37-37
    2. Jingguo Bi, Mingqiang Wang, Wei Wei
      Pages 51-60
    3. Mahdi Daghmehchi Firoozjaei, Sang Min Lee, Hyoungshick Kim
      Pages 61-71
    4. Hwajeong Seo, Taehwan Park, Janghyun Ji, Zhi Hu, Howon Kim
      Pages 72-84
  4. Web Security and Emerging Technologies

    1. Front Matter
      Pages 85-85
    2. Joon Young Park, Jong Pil Yun, Dong Hoon Lee
      Pages 87-100
    3. Minsu Lee, Hyungu Lee, Ji Sun Shin
      Pages 101-111
  5. Systems Security and Authentication

    1. Front Matter
      Pages 113-113
    2. Jae Hyeon Woo, Moosung Park, Kyungho Lee
      Pages 127-136
    3. Jonathan Grimm, Irfan Ahmed, Vassil Roussev, Manish Bhatt, ManPyo Hong
      Pages 137-149
    4. Jungwoo Joh, Yezee Seo, Hoon-Kyu Kim, Taekyoung Kwon
      Pages 150-161
    5. Kwon-Jin Yoon, Jaehyeon Yoon, Souhwan Jung
      Pages 162-172
    6. Momoka Kasuya, Kazuo Sakiyama
      Pages 173-183

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017.
The 12 revised full papers and 15 short papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections such as attack and defense; theory in security; web security and emerging technologies; systems security and authentication; crypto protocols; and attack detections and legal aspects.


Analysis of network and security protocol Authentication and authorization Botnet defense Critical infrastructure security Digital forensics Embedded systems security Hardware and physical security Malware analysis Network-based attacks Security policy Web Security data security cryptography authentication computer networks computer crime telecommunication networks public key cryptography internet signal processsing

Editors and affiliations

  1. 1.KAISTDaejeonKorea (Republic of)
  2. 2.Georgia Institute of TechnologyAtlantaUSA

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment