Information Security Applications

15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers

  • Kyung-Hyune Rhee
  • Jeong Hyun Yi
Conference proceedings WISA 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8909)

Also part of the Security and Cryptology book sub series (LNSC, volume 8909)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Malware Detection

    1. Front Matter
      Pages 1-1
    2. Ahmed E. Kosba, Aziz Mohaisen, Andrew West, Trevor Tonn, Huy Kang Kim
      Pages 3-16
    3. Jaehyeok Song, Jonghyuk Song, Jong Kim
      Pages 17-26
    4. Ubaidullah Rajput, Fizza Abbas, Rasheed Hussain, Hasoo Eun, Heekuck Oh
      Pages 27-37
  3. Mobile Security

    1. Front Matter
      Pages 39-39
    2. Eunhyun Kim, Kyungwon Park, Hyoungshick Kim, Jaeseung Song
      Pages 55-67
    3. Jina Kang, Daehyun Kim, Hyoungshick Kim, Jun Ho Huh
      Pages 68-79
  4. Vulnerability Analysis

    1. Front Matter
      Pages 81-81
    2. Shinichi Matsumoto, Yuya Onitsuka, Junpei Kawamoto, Kouichi Sakurai
      Pages 83-94
    3. Shinjo Park, Suwan Park, Insu Yun, Dongkwan Kim, Yongdae Kim
      Pages 95-106
    4. Ashar Javed, Jörg Schwenk
      Pages 122-133
  5. Applied Cryptography

    1. Front Matter
      Pages 135-135
    2. Ryoma Ito, Atsuko Miyaji
      Pages 137-149
    3. Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim
      Pages 150-161
  6. Network Security

    1. Front Matter
      Pages 163-163
    2. Dongwan Kang, Joohyung Oh, Chaetae Im
      Pages 165-176
    3. Chao-Lieh Chen, Shen-Chien Chen, Chun-Ruei Chang, Chia-Fei Lin
      Pages 177-189

About these proceedings

Introduction

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy.

Keywords

Access Control Advanced Encryption Standard (AES) Block Cipher Computer Forensics Cryptocurrency Cryptography Cyber-Attack Identity-based Encryption Information Security Malware Permission System Phishing Public key Cryptography Secure Systems Security Applications Security Protocol Security Technologies Smartphone

Editors and affiliations

  • Kyung-Hyune Rhee
    • 1
  • Jeong Hyun Yi
    • 2
  1. 1.Pukyong National UniversityBusanKorea, Republic of (South Korea)
  2. 2.School of Computer Science and EngineeringSoongsil UniversitySeoulKorea, Republic of (South Korea)

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-15087-1
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-15086-4
  • Online ISBN 978-3-319-15087-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering