Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers /
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI)...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2005.
|
Σειρά: | Lecture Notes in Computer Science,
3325 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Network/Computer Security
- Impacts of Security Protocols on Real-Time Multimedia Communications
- An Improvement on Privacy and Authentication in GSM
- Encrypted Watermarks and Linux Laptop Security
- Inconsistency Detection of Authorization Policies in Distributed Component Environment
- Public Key Schemes I
- Custodian-Hiding Verifiable Encryption
- Proving Key Usage
- Public Key Encryption with Conjunctive Field Keyword Search
- Intrusion Detection I
- A Probabilistic Method for Detecting Anomalous Program Behavior
- Service Discrimination and Audit File Reduction for Effective Intrusion Detection
- IDS False Alarm Filtering Using KNN Classifier
- Watermarking/Anti-spamming
- Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking
- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment
- Public Key Schemes II
- Efficient Authenticated Key Agreement Protocol for Dynamic Groups
- A Ring Signature Scheme Using Bilinear Pairings
- Verifiable Pairing and Its Applications
- Intrusion Detection II
- Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading
- An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks
- Application of Content Computing in Honeyfarm
- Digital Rights Management
- License Protection with a Tamper-Resistant Token
- An Adaptive Approach to Hardware Alteration for Digital Rights Management
- Dynamic Fingerprinting over Broadcast Using Revocation Scheme
- Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels
- e-Commerce Security
- Vulnerability of a Mobile Payment System Proposed at WISA 2002
- Fair Offline Payment Using Verifiable Encryption
- A Limited-Used Key Generation Scheme for Internet Transactions
- Efficient Implementation
- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes
- Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II
- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors
- Hyperelliptic Curve Coprocessors on a FPGA
- Anonymous Communication
- Key-Exchange Protocol Using Pre-agreed Session-ID
- A New k-Anonymous Message Transmission Protocol
- Onions Based on Universal Re-encryption – Anonymous Communication Immune Against Repetitive Attack
- Side-Channel Attacks
- Side Channel Cryptanalysis on SEED
- Secure and Efficient AES Software Implementation for Smart Cards
- Practical Template Attacks
- Evaluation and Improvement of the Tempest Fonts.