Skip to main content
Book cover

Information Security Applications

16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers

  • Conference proceedings
  • © 2016

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9503)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: WISA 2015.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (35 papers)

  1. Hardware Security

  2. Cryptography

  3. Side Channel Attacks and Countermeasures

Other volumes

  1. Information Security Applications

Keywords

About this book

This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015.

The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections such as hardware security; cryptography, side channel attacks and countermeasures; security and threat analysis; IoT security; network security; cryptography; application security.

Editors and Affiliations

  • Pusan National University, Busan, Korea (Republic of)

    Ho-won Kim

  • Electronics and Telecommunications Research Institute, Daejeon, Korea (Republic of)

    Dooho Choi

Bibliographic Information

Publish with us