Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Information Security Applications

20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers

  • Conference proceedings
  • © 2020

Overview

Editors:
  1. Ilsun You
    1. Soonchunhyang University, Asan, Korea (Republic of)

    You can also search for this editor inPubMed Google Scholar

Part of the book series:Lecture Notes in Computer Science (LNCS, volume 11897)

Part of the book sub series:Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: WISA 2019.

This is a preview of subscription content,log in via an institution to check access.

Access this book

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Other ways to access

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019. The 29 revised full papers presented in this volume were carefully reviewed and selected from 63 submissions.

The primary focus of WISA 2019 was on systems and network security including all other technical and practical aspects of security application in general. The papers are grouped in the following topical sections: Application and Game Security; Network Security and Blockchain; Cryptography; Security with AI and Machine Learning; IoT Security; Hardware Security; and Selected Security Issues.


Similar content being viewed by others

Keywords

Table of contents (28 papers)

  1. Front Matter

    Pages i-xiii
  2. Application and Game Security

    1. Front Matter

      Pages 1-1
    2. Turn On the Lights: User Behavior in Game Environment Using CPTED

      • Jeongeun Seo, Minhee Joo, Kyungho Lee
      Pages 14-24
    3. QR Code Watermarking for Digital Images

      • Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim
      Pages 25-37
  3. Network Security and Blockchain

    1. Front Matter

      Pages 39-39
    2. FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking

      • Hyuntae Kim, Seongil Wi, Hyunjoo Lee, Sooel Son
      Pages 41-54
    3. DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDN

      • Goksel Simsek, Hakan Bostan, Alper Kaan Sarica, Egemen Sarikaya, Alperen Keles, Pelin Angin et al.
      Pages 55-66
    4. A Secure and Self-tallying E-voting System Based on Blockchain

      • Gongxian Zeng, Meiqi He, Siu Ming Yiu
      Pages 67-76
  4. Cryptography

    1. Front Matter

      Pages 77-77
    2. An Extended CTRT for AES-256

      • SeongHan Shin, Shota Yamada, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani et al.
      Pages 79-91
    3. A Blind Ring Signature Based on the Short Integer Solution Problem

      • Huy Quoc Le, Dung Hoang Duong, Willy Susilo
      Pages 92-111
    4. A Note on the Invisibility and Anonymity of Undeniable Signature Schemes

      • Jia-Ch’ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa
      Pages 112-125
    5. Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR

      • Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama
      Pages 126-140
    6. Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing

      • Hao-Tian Wu, Yiu-ming Cheung, Zhenwei Zhuang, Shaohua Tang
      Pages 141-154
    7. Timed-Release Encryption with Master Time Bound Key

      • Gwangbae Choi, Serge Vaudenay
      Pages 167-179
    8. Secret Sharing on Evolving Multi-level Access Structure

      • Sabyasachi Dutta, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai
      Pages 180-191
    9. Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof

      • Jongkil Kim, Joonsang Baek, Willy Susilo, Yang-Wai Chow
      Pages 206-216

Other volumes

  1. Information Security Applications

Editors and Affiliations

  • Soonchunhyang University, Asan, Korea (Republic of)

    Ilsun You

Bibliographic Information

Publish with us

Back to top

Access this book

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Other ways to access


[8]ページ先頭

©2009-2025 Movatter.jp