


default search action
WISA 2012: Jeju Island, Korea
- Dong Hoon Lee, Moti Yung:

Information Security Applications - 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7690, Springer 2012, ISBN 978-3-642-35415-1
Symmetric Cipher
- Yanfeng Wang, Wenling Wu, Xiaoli Yu, Lei Zhang:

Security on LBlock against Biclique Cryptanalysis. 1-14 - Keting Jia, Leibo Li:

Improved Impossible Differential Attacks on Reduced-Round MISTY1. 15-27 - Satoshi Tanaka, Tung Chou

, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai:
Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs. 28-42 - Wentao Zhao, Xin Hai, Shaojing Fu, Chao Li, Yanfeng Wang:

Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity. 43-54
Secure Hardware/Public Key Crypto Application
- Hwajeong Seo, Howon Kim:

Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. 55-67 - Hyunmin Kim

, Vladimir Rozic, Ingrid Verbauwhede:
Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumption. 68-81 - JeaHoon Park, JaeCheol Ha:

Improved Differential Fault Analysis on Block Cipher ARIA. 82-95 - Pairat Thorncharoensri

, Willy Susilo
, Yi Mu:
Multi-Level Controlled Signature. 96-110 - Liangze Li, Fan Zhang:

Tate Pairing Computation on Generalized Hessian Curves. 111-123 - Mario Larangeira, Keisuke Tanaka:

Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model. 124-143
Cryptographic Protocols/ Digital Forensics
- Hyun-Sun Kang, Chang-Seop Park:

An Authentication and Key Management Scheme for the Proxy Mobile IPv6. 144-160 - László Aszalós, Andrea Huszti

:
Payment Approval for PayWord. 161-176 - Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang:

Anonymity-Based Authenticated Key Agreement with Full Binding Property. 177-191 - Junghoon Oh

, Namheun Son, Sangjin Lee, Kyungho Lee:
A Study for Classification of Web Browser Log and Timeline Visualization. 192-207 - François Durvaux, Benoît Gérard, Stéphanie Kerckhof, François Koeune, François-Xavier Standaert

:
Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions. 208-225 - Shun-Te Liu, Yi-Ming Chen, Hui-Ching Hung:

N-Victims: An Approach to Determine N-Victims for APT Investigations. 226-240
Network Security
- Jaeun Choi, Gisung Kim, Tae Ghyoon Kim, Sehun Kim:

An Efficient Filtering Method for Detecting Malicous Web Pages. 241-253 - Eric Lin, John Aycock, Mohammad Mannan:

Lightweight Client-Side Methods for Detecting Email Forgery. 254-269 - Yangseo Choi, Ik-Kyun Kim, Jintae Oh, Jongsoo Jang:

AIGG Threshold Based HTTP GET Flooding Attack Detection. 270-284 - Hyunjoo Kim, Byoung-Koo Kim, Daewon Kim, Ik-Kyun Kim, Tai-Myoung Chung:

Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks. 285-295 - Rasheed Hussain, Sangjin Kim, Heekuck Oh:

Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice. 296-311 - Incheol Shin, Sinkyu Kim, Jungtaek Seo:

On Trigger Detection against Reactive Jamming Attacks: A Localized Solution. 312-327
Trust Management/Database Security
- Yu-Chih Wei, Yi-Ming Chen:

Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs. 328-344 - Yukyong Kim, Kyung-Goo Doh:

A Trust Management Model for QoS-Based Service Selection. 345-357 - Haklin Kimm, Norkee Sherpa:

Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems. 358-370

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














