Information Security Applications 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers /
The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and TelecommunicationsResearchInstitute(ETRI),andtheMinistryofInformation and Communi...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2004.
|
Σειρά: | Lecture Notes in Computer Science,
2908 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Network Security
- Model Checking of Security Protocols with Pre-configuration
- Remote Access VPN with Port Protection Function by Mobile Codes
- A Role of DEVS Simulation for Information Assurance
- Mobile Security
- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes
- Reliable Cascaded Delegation Scheme for Mobile Agent Environments
- Practical Solution for Location Privacy in Mobile IPv6
- Intrusion Detection
- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection
- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System
- Towards a Global Security Architecture for Intrusion Detection and Reaction Management
- Internet Security
- Intrusion-Tolerant System Design for Web Server Survivability
- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access
- An Automatic Security Evaluation System for IPv6 Network
- Secure Software, Hardware, and Systems I
- A Location Privacy Protection Mechanism for Smart Space
- Secure System Architecture Based on Dynamic Resource Reallocation
- Fair Exchange with Guardian Angels
- Secure Software, Hardware, and Systems II
- Sign-Based Differential Power Analysis
- Asymmetric Watermarking Scheme Using Permutation Braids
- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m )
- E-commerce Security
- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction
- Multi-dimensional Hash Chain For Sealed-Bid Auction
- An Improved Forward Integrity Protocol for Mobile Agents
- Digital Rights Management
- Taming “Trusted Platforms” by Operating System Design
- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation
- Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes
- Biometrics and Human Interfaces I
- 3D Face Recognition under Pose Varying Environments
- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint
- Fingerprint-Based Authentication for USB Token Systems
- Biometrics and Human Interfaces II
- Iris Recognition System Using Wavelet Packet and Support Vector Machines
- Biometrics Identification and Verification Using Projection-Based Face Recognition System
- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification
- Public Key Cryptography / Key Management
- E-MHT. An Efficient Protocol for Certificate Status Checking
- A Comment on Group Independent Threshold Sharing
- Automation-Considered Logic of Authentication and Key Distribution
- Applied Cryptography
- The MESH Block Ciphers
- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves
- Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer.