Information Security Applications: 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers

Front Cover
Souhwan Jung, Moti Young
Springer Science & Business Media, Jan 25, 2012 - Computers - 271 pages
This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA 2011, held in Jeju Island, Korea, in August 2011. The 21 revised full papers presented were carefully reviewed and selected from 74 submissions. The workshop serves as a forum for new results from the academic research community as well as from the industry; the papers are focusing on all technical and practical aspects of cryptographic and non-cryptographic security applications.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Practical Attacks on a Cryptosystem Proposed in Patent WO2009066313
1
Generalized Security Analysis of the Random Key Bits Leakage Attack
13
Improved Integral Attacks on ReducedRound CLEFIA Block Cipher
28
Analysis of DMMode with Middle FeedForward
40
KnownKey Distinguisher on RoundReduced 3D Block Cipher
55
IdentityBased Signcryption from IdentityBased Cryptography
70
OrderPreserving Encryption for Nonuniformly Distributed Plaintexts
84
Solving a DLP with Auxiliary Input with the ρAlgorithm
98
Lightweight MiddlewareBased ZigBee Security in Building Energy Management System
151
A MapLayerBased Access Control Model
157
Application Authentication for Hybrid Services of Broadcasting and Communications Networks
171
Accelerating Multiparty Computation by Efficient Random Number BitwiseSharing Protocols
187
Biometric Based Secure Communications without Predeployed Key for Biosensor Implanted in Body Sensor Networks
203
Mutual Private Set Intersection with Linear Complexity
219
Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs
232
Public Transportation
242

A General NTRULike Framework for Constructing LatticeBased PublicKey Cryptosystems
109
A PeertoPeer ContentDistribution Scheme Resilient to Key Leakage
121
Rule Indexing for Efficient Intrusion Detection Systems
136
Security Data Extraction from IEC 61850 ACSI Models for Network and System Management
142
Exploiting Routing Tree Construction in CTP
256
Author Index
271
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information