Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Lee, Jae Kwang (Επιμελητής έκδοσης), Yi, Okyeon (Επιμελητής έκδοσης), Yung, Moti (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Lecture Notes in Computer Science, 4298
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Public Key Crypto Applications/Virus Protection
  • Controllable Ring Signatures
  • Efficient User Authentication and Key Agreement in Wireless Sensor Networks
  • Identity-Based Key Issuing Without Secure Channel in a Broad Area
  • PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution
  • Cyber Indication/Intrusion Detection
  • SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks
  • SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment
  • sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm
  • Biometrics/Security Trust Management
  • Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords
  • Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification
  • Quality Assurance for Evidence Collection in Network Forensics
  • Secure Software/Systems
  • Visualization of Permission Checks in Java Using Static Analysis
  • Deployment of Virtual Machines in Lock-Keeper
  • Smart Cards/Secure Hardware
  • Investigations of Power Analysis Attacks and Countermeasures for ARIA
  • Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols
  • A Novel Key Agreement Scheme in a Multiple Server Environment
  • Mobile Security
  • Cost-Effective IDS Operating Scheme in MANETs
  • Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6
  • A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones
  • DRM/Information Hiding/Ubiquitous Computing Security/P2P Security
  • Distributed Management of OMA DRM Domains
  • New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting
  • A Key Management Based on Multiple Regression in Hierarchical Sensor Network
  • Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks
  • Privacy/Anonymity
  • Privacy Protection in PKIs: A Separation-of-Authority Approach
  • Three-Party Password Authenticated Key Agreement Resistant to Server Compromise
  • Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature
  • Secret Handshake with Multiple Groups
  • Internet and Wireless Security
  • Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs
  • EAP Using the Split Password-Based Authenticated Key Agreement
  • How Many Malicious Scanners Are in the Internet?
  • E-Passport: The Global Traceability Or How to Feel Like a UPS Package.