Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers /
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009. The 27 revised full papers presented were carefully reviewed and selected from a total of 79...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2009.
|
Σειρά: | Lecture Notes in Computer Science,
5932 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Multimedia Security
- Protecting IPTV Service Network against Malicious Rendezvous Point
- Design and Implementation of SIP-aware Security Management System
- Device Security
- Application Management Framework in User Centric Smart Card Ownership Model
- When Compromised Readers Meet RFID
- HW Implementation Security
- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?
- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules
- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
- Applied Cryptography
- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles
- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity
- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy
- ID-Based Adaptive Oblivious Transfer
- Side Channel Attacks
- Unknown Plaintext Template Attacks
- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices
- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation
- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption
- Cryptograptanalysis
- Finding Collisions for a 45-Step Simplified HAS-V
- Non-linear Error Detection for Finite State Machines
- Quadratic Equations from a Kind of S-boxes
- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure
- Anonymity/Authentication/Access Control
- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET
- A Selectable k-Times Relaxed Anonymous Authentication Scheme
- PUF-Based Authentication Protocols – Revisited
- Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
- Network Security
- Securing Remote Access Inside Wireless Mesh Networks
- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers
- USN Middleware Security Model
- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs.