Advertisement

Information Security Applications

12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers

  • Souhwan Jung
  • Moti Yung

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7115)

Table of contents

  1. Front Matter
  2. Jun Kogure, Noboru Kunihiro, Hirosuke Yamamoto
    Pages 13-27
  3. Yanjun Li, Wenling Wu, Lei Zhang
    Pages 28-39
  4. Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama
    Pages 40-54
  5. Le Dong, Wenling Wu, Shuang Wu, Jian Zou
    Pages 55-69
  6. Woomyo Lee, Jae Woo Seo, Pil Joong Lee
    Pages 70-83
  7. Dae Hyun Yum, Duk Soo Kim, Jin Seok Kim, Pil Joong Lee, Sung Je Hong
    Pages 84-97
  8. Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
    Pages 98-108
  9. Tatsuyuki Matsushita, Shinji Yamanaka, Fangming Zhao
    Pages 121-135
  10. Boojoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im
    Pages 136-141
  11. Chung-Hyo Kim, Moon-Seok Choi, Seong-Ho Ju, Yong-Hun Lim, Jong-Mock Baek
    Pages 142-150
  12. Insung Hong, Jisung Byun, Sehyun Park
    Pages 151-156
  13. Yingjun Zhang, Yang Zhang, Kai Chen
    Pages 157-170
  14. Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura
    Pages 187-202
  15. Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon
    Pages 219-231
  16. Islam Hegazy, Reihaneh Safavi-Naini, Carey Williamson
    Pages 256-270
  17. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA 2011, held in Jeju Island, Korea, in August 2011. The 21 revised full papers presented were carefully reviewed and selected from 74 submissions. The workshop serves as a forum for new results from the academic research community as well as from the industry; the papers are focusing on all technical and practical aspects of cryptographic and non-cryptographic security applications.

Keywords

application authentication biometrics grid security identity-based cryptography wireless sensor networks

Editors and affiliations

  • Souhwan Jung
    • 1
  • Moti Yung
    • 2
  1. 1.School of Electronic EngineeringSoongsil UniversitySeoulKorea
  2. 2.Google Inc. and Computer Science DepartmentColumbia UniversityNew YorkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-27890-7
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-27889-1
  • Online ISBN 978-3-642-27890-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering