This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Information Security Applications, WISA 2009, held in Busan, Korea, during August 25-27, 2009.
The 27 revised full papers presented were carefully reviewed and selected from a total of 79 submissions. The papers are organized in topical sections on mutlimedia security, device security, HW implementation security, applied cryptography, side channel attacks, cryptograptanalysis, anonymity/authentication/access controll, and network security.
Author(s): Hyeokchan Kwon, Yong-Hyuk Moon, Jaehoon Nah, Dongil Seo (auth.), Heung Youl Youm, Moti Yung (eds.)
Series: Lecture Notes in Computer Science 5932 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009
Language: English
Pages: 386
Tags: Data Encryption; Computer Communication Networks; Discrete Mathematics in Computer Science; Systems and Data Security; Algorithm Analysis and Problem Complexity; Math Applications in Computer Science
Front Matter....Pages -
Protecting IPTV Service Network against Malicious Rendezvous Point....Pages 1-9
Design and Implementation of SIP-aware Security Management System....Pages 10-19
Application Management Framework in User Centric Smart Card Ownership Model....Pages 20-35
When Compromised Readers Meet RFID....Pages 36-50
Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?....Pages 51-65
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules....Pages 66-78
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment....Pages 79-93
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles....Pages 94-108
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity....Pages 109-117
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy....Pages 118-132
ID-Based Adaptive Oblivious Transfer....Pages 133-147
Unknown Plaintext Template Attacks....Pages 148-162
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices....Pages 163-177
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S -Box Implementation....Pages 178-192
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption....Pages 193-205
Finding Collisions for a 45-Step Simplified HAS-V....Pages 206-225
Non-linear Error Detection for Finite State Machines....Pages 226-238
Quadratic Equations from a Kind of S-boxes....Pages 239-253
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure....Pages 254-267
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET....Pages 268-280
A Selectable k -Times Relaxed Anonymous Authentication Scheme....Pages 281-295
PUF-Based Authentication Protocols – Revisited....Pages 296-308
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application....Pages 309-323
Securing Remote Access Inside Wireless Mesh Networks....Pages 324-338
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers....Pages 339-353
USN Middleware Security Model....Pages 354-365
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs....Pages 366-383
Back Matter....Pages -