Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009.

The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.

Author(s): Hyeokchan Kwon, Yong-Hyuk Moon, Jaehoon Nah, Dongil Seo (auth.), Heung Youl Youm, Moti Yung (eds.)
Series: Lecture Notes in Computer Science 5932 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 386
Tags: Data Encryption; Computer Communication Networks; Discrete Mathematics in Computer Science; Systems and Data Security; Algorithm Analysis and Problem Complexity; Math Applications in Computer Science

Front Matter....Pages -
Protecting IPTV Service Network against Malicious Rendezvous Point....Pages 1-9
Design and Implementation of SIP-aware Security Management System....Pages 10-19
Application Management Framework in User Centric Smart Card Ownership Model....Pages 20-35
When Compromised Readers Meet RFID....Pages 36-50
Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?....Pages 51-65
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules....Pages 66-78
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment....Pages 79-93
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles....Pages 94-108
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity....Pages 109-117
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy....Pages 118-132
ID-Based Adaptive Oblivious Transfer....Pages 133-147
Unknown Plaintext Template Attacks....Pages 148-162
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices....Pages 163-177
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S -Box Implementation....Pages 178-192
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption....Pages 193-205
Finding Collisions for a 45-Step Simplified HAS-V....Pages 206-225
Non-linear Error Detection for Finite State Machines....Pages 226-238
Quadratic Equations from a Kind of S-boxes....Pages 239-253
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure....Pages 254-267
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET....Pages 268-280
A Selectable k -Times Relaxed Anonymous Authentication Scheme....Pages 281-295
PUF-Based Authentication Protocols – Revisited....Pages 296-308
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application....Pages 309-323
Securing Remote Access Inside Wireless Mesh Networks....Pages 324-338
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers....Pages 339-353
USN Middleware Security Model....Pages 354-365
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs....Pages 366-383
Back Matter....Pages -