My Account Log in

1 option

Information Security Applications : 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers / edited by Jae-Kwang Lee, Okyeon Yi, Moti Yung.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Lee, Jae-Kwang, editor.
Yi, Okyeon, editor.
Yung, Moti, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 4298.
Security and Cryptology ; 4298
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer security.
Algorithms.
Computer networks.
Management information systems.
Computer science.
Computers, Special purpose.
Cryptology.
Systems and Data Security.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Management of Computing and Information Systems.
Special Purpose and Application-Based Systems.
Local Subjects:
Cryptology.
Systems and Data Security.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Management of Computing and Information Systems.
Special Purpose and Application-Based Systems.
Physical Description:
1 online resource (XIV, 410 pages).
Edition:
First edition 2007.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
System Details:
text file PDF
Contents:
Public Key Crypto Applications/Virus Protection
Controllable Ring Signatures
Efficient User Authentication and Key Agreement in Wireless Sensor Networks
Identity-Based Key Issuing Without Secure Channel in a Broad Area
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution
Cyber Indication/Intrusion Detection
SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks
SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment
sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm
Biometrics/Security Trust Management
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification
Quality Assurance for Evidence Collection in Network Forensics
Secure Software/Systems
Visualization of Permission Checks in Java Using Static Analysis
Deployment of Virtual Machines in Lock-Keeper
Smart Cards/Secure Hardware
Investigations of Power Analysis Attacks and Countermeasures for ARIA
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols
A Novel Key Agreement Scheme in a Multiple Server Environment
Mobile Security
Cost-Effective IDS Operating Scheme in MANETs
Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones
DRM/Information Hiding/Ubiquitous Computing Security/P2P Security
Distributed Management of OMA DRM Domains
New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting
A Key Management Based on Multiple Regression in Hierarchical Sensor Network
Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks
Privacy/Anonymity
Privacy Protection in PKIs: A Separation-of-Authority Approach
Three-Party Password Authenticated Key Agreement Resistant to Server Compromise
Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature
Secret Handshake with Multiple Groups
Internet and Wireless Security
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs
EAP Using the Split Password-Based Authenticated Key Agreement
How Many Malicious Scanners Are in the Internet?
E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
Other Format:
Printed edition:
ISBN:
978-3-540-71093-6
9783540710936
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account