My Account Log in

1 option

Information Security Applications : 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers / edited by Chae Hoon Lim, Moti Yung.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Lim, Chae Hoon, editor.
Yung, Moti, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 3325.
Security and Cryptology ; 3325
Language:
English
Subjects (All):
Data encryption (Computer science).
Operating systems (Computers).
Algorithms.
Computer networks.
Management information systems.
Computer science.
Computers, Special purpose.
Cryptology.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Management of Computing and Information Systems.
Special Purpose and Application-Based Systems.
Local Subjects:
Cryptology.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Management of Computing and Information Systems.
Special Purpose and Application-Based Systems.
Physical Description:
1 online resource (XII, 472 pages).
Edition:
First edition 2005.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
System Details:
text file PDF
Summary:
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications from the academic community as well as from the industry. The workshop program covers a wide range of security aspects including cryptography, cryptanalysis, network/system security and implementation aspects. The programcommittee received169 papersfrom 22 countries,andaccepted 37 papers for a full presentation track and 30 papers for a short presentation track. Each paper was carefully evaluated through peer-review by at least three members of the programcommittee. This volume contains revised versions of 36 papers accepted and presented in the full presentation track. Short papers were only published in the WISA 2004 pre-proceedings as preliminary versions and are allowed to be published elsewhere as extended versions. In addition to the contributed papers, Professors Gene Tsudik and Ross Andersongaveinvitedtalks,entitledSecurityinOutsourcedDatabasesandWhat does 'Security' mean for Ubiquitous Applications?, respectively.
Contents:
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications
An Improvement on Privacy and Authentication in GSM
Encrypted Watermarks and Linux Laptop Security
Inconsistency Detection of Authorization Policies in Distributed Component Environment
Public Key Schemes I
Custodian-Hiding Verifiable Encryption
Proving Key Usage
Public Key Encryption with Conjunctive Field Keyword Search
Intrusion Detection I
A Probabilistic Method for Detecting Anomalous Program Behavior
Service Discrimination and Audit File Reduction for Effective Intrusion Detection
IDS False Alarm Filtering Using KNN Classifier
Watermarking/Anti-spamming
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking
Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment
Public Key Schemes II
Efficient Authenticated Key Agreement Protocol for Dynamic Groups
A Ring Signature Scheme Using Bilinear Pairings
Verifiable Pairing and Its Applications
Intrusion Detection II
Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks
Application of Content Computing in Honeyfarm
Digital Rights Management
License Protection with a Tamper-Resistant Token
An Adaptive Approach to Hardware Alteration for Digital Rights Management
Dynamic Fingerprinting over Broadcast Using Revocation Scheme
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels
e-Commerce Security
Vulnerability of a Mobile Payment System Proposed at WISA 2002
Fair Offline Payment Using Verifiable Encryption
A Limited-Used Key Generation Scheme for Internet Transactions
Efficient Implementation
Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes
Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors
Hyperelliptic Curve Coprocessors on a FPGA
Anonymous Communication
Key-Exchange Protocol Using Pre-agreed Session-ID
A New k-Anonymous Message Transmission Protocol
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Side-Channel Attacks
Side Channel Cryptanalysis on SEED
Secure and Efficient AES Software Implementation for Smart Cards
Practical Template Attacks
Evaluation and Improvement of the Tempest Fonts.
Other Format:
Printed edition:
ISBN:
978-3-540-31815-6
9783540318156
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account