Information Security Applications 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers /

The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and TelecommunicationsResearchInstitute(ETRI),andtheMinistryofInformation and Communi...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chae, Ki-Joon (Επιμελητής έκδοσης), Yung, Moti (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2004.
Σειρά:Lecture Notes in Computer Science, 2908
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Network Security
  • Model Checking of Security Protocols with Pre-configuration
  • Remote Access VPN with Port Protection Function by Mobile Codes
  • A Role of DEVS Simulation for Information Assurance
  • Mobile Security
  • Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes
  • Reliable Cascaded Delegation Scheme for Mobile Agent Environments
  • Practical Solution for Location Privacy in Mobile IPv6
  • Intrusion Detection
  • CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection
  • Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System
  • Towards a Global Security Architecture for Intrusion Detection and Reaction Management
  • Internet Security
  • Intrusion-Tolerant System Design for Web Server Survivability
  • PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access
  • An Automatic Security Evaluation System for IPv6 Network
  • Secure Software, Hardware, and Systems I
  • A Location Privacy Protection Mechanism for Smart Space
  • Secure System Architecture Based on Dynamic Resource Reallocation
  • Fair Exchange with Guardian Angels
  • Secure Software, Hardware, and Systems II
  • Sign-Based Differential Power Analysis
  • Asymmetric Watermarking Scheme Using Permutation Braids
  • Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m )
  • E-commerce Security
  • Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction
  • Multi-dimensional Hash Chain For Sealed-Bid Auction
  • An Improved Forward Integrity Protocol for Mobile Agents
  • Digital Rights Management
  • Taming “Trusted Platforms” by Operating System Design
  • A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation
  • Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes
  • Biometrics and Human Interfaces I
  • 3D Face Recognition under Pose Varying Environments
  • An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint
  • Fingerprint-Based Authentication for USB Token Systems
  • Biometrics and Human Interfaces II
  • Iris Recognition System Using Wavelet Packet and Support Vector Machines
  • Biometrics Identification and Verification Using Projection-Based Face Recognition System
  • Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification
  • Public Key Cryptography / Key Management
  • E-MHT. An Efficient Protocol for Certificate Status Checking
  • A Comment on Group Independent Threshold Sharing
  • Automation-Considered Logic of Authentication and Key Distribution
  • Applied Cryptography
  • The MESH Block Ciphers
  • Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves
  • Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer.