This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.In this paper, we suggested a method named Balanced Indexing (BI) that extracts indices with two parameters, the ... For the future work, we will design a new detection engine, optimized for BI. ... Z., Diao, Y., Lakshman, T.V., Katz, R.H.: Fast and Memory-Efficient Regular Expression Matching for Deep Packet Inspection.
|Title||:||Information Security and Cryptology -- ICISC 2012|
|Author||:||Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon|
|Publisher||:||Springer - 2013-04-03|