default search action
WISA 2012: Jeju Island, Korea
- Dong Hoon Lee, Moti Yung:
Information Security Applications - 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7690, Springer 2012, ISBN 978-3-642-35415-1
Symmetric Cipher
- Yanfeng Wang, Wenling Wu, Xiaoli Yu, Lei Zhang:
Security on LBlock against Biclique Cryptanalysis. 1-14 - Keting Jia, Leibo Li:
Improved Impossible Differential Attacks on Reduced-Round MISTY1. 15-27 - Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai:
Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs. 28-42 - Wentao Zhao, Xin Hai, Shaojing Fu, Chao Li, Yanfeng Wang:
Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity. 43-54
Secure Hardware/Public Key Crypto Application
- Hwajeong Seo, Howon Kim:
Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. 55-67 - Hyunmin Kim, Vladimir Rozic, Ingrid Verbauwhede:
Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumption. 68-81 - JeaHoon Park, JaeCheol Ha:
Improved Differential Fault Analysis on Block Cipher ARIA. 82-95 - Pairat Thorncharoensri, Willy Susilo, Yi Mu:
Multi-Level Controlled Signature. 96-110 - Liangze Li, Fan Zhang:
Tate Pairing Computation on Generalized Hessian Curves. 111-123 - Mario Larangeira, Keisuke Tanaka:
Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model. 124-143
Cryptographic Protocols/ Digital Forensics
- Hyun-Sun Kang, Chang-Seop Park:
An Authentication and Key Management Scheme for the Proxy Mobile IPv6. 144-160 - László Aszalós, Andrea Huszti:
Payment Approval for PayWord. 161-176 - Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang:
Anonymity-Based Authenticated Key Agreement with Full Binding Property. 177-191 - Junghoon Oh, Namheun Son, Sangjin Lee, Kyungho Lee:
A Study for Classification of Web Browser Log and Timeline Visualization. 192-207 - François Durvaux, Benoît Gérard, Stéphanie Kerckhof, François Koeune, François-Xavier Standaert:
Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions. 208-225 - Shun-Te Liu, Yi-Ming Chen, Hui-Ching Hung:
N-Victims: An Approach to Determine N-Victims for APT Investigations. 226-240
Network Security
- Jaeun Choi, Gisung Kim, Tae Ghyoon Kim, Sehun Kim:
An Efficient Filtering Method for Detecting Malicous Web Pages. 241-253 - Eric Lin, John Aycock, Mohammad Mannan:
Lightweight Client-Side Methods for Detecting Email Forgery. 254-269 - Yangseo Choi, Ik-Kyun Kim, Jintae Oh, Jongsoo Jang:
AIGG Threshold Based HTTP GET Flooding Attack Detection. 270-284 - Hyunjoo Kim, Byoung-Koo Kim, Daewon Kim, Ik-Kyun Kim, Tai-Myoung Chung:
Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks. 285-295 - Rasheed Hussain, Sangjin Kim, Heekuck Oh:
Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice. 296-311 - Incheol Shin, Sinkyu Kim, Jungtaek Seo:
On Trigger Detection against Reactive Jamming Attacks: A Localized Solution. 312-327
Trust Management/Database Security
- Yu-Chih Wei, Yi-Ming Chen:
Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs. 328-344 - Yukyong Kim, Kyung-Goo Doh:
A Trust Management Model for QoS-Based Service Selection. 345-357 - Haklin Kimm, Norkee Sherpa:
Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems. 358-370
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.