Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2007.
|
Σειρά: | Lecture Notes in Computer Science,
4298 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Public Key Crypto Applications/Virus Protection
- Controllable Ring Signatures
- Efficient User Authentication and Key Agreement in Wireless Sensor Networks
- Identity-Based Key Issuing Without Secure Channel in a Broad Area
- PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution
- Cyber Indication/Intrusion Detection
- SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks
- SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment
- sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm
- Biometrics/Security Trust Management
- Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords
- Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification
- Quality Assurance for Evidence Collection in Network Forensics
- Secure Software/Systems
- Visualization of Permission Checks in Java Using Static Analysis
- Deployment of Virtual Machines in Lock-Keeper
- Smart Cards/Secure Hardware
- Investigations of Power Analysis Attacks and Countermeasures for ARIA
- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols
- A Novel Key Agreement Scheme in a Multiple Server Environment
- Mobile Security
- Cost-Effective IDS Operating Scheme in MANETs
- Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6
- A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones
- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security
- Distributed Management of OMA DRM Domains
- New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting
- A Key Management Based on Multiple Regression in Hierarchical Sensor Network
- Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks
- Privacy/Anonymity
- Privacy Protection in PKIs: A Separation-of-Authority Approach
- Three-Party Password Authenticated Key Agreement Resistant to Server Compromise
- Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature
- Secret Handshake with Multiple Groups
- Internet and Wireless Security
- Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs
- EAP Using the Split Password-Based Authenticated Key Agreement
- How Many Malicious Scanners Are in the Internet?
- E-Passport: The Global Traceability Or How to Feel Like a UPS Package.