Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008. The 24 revised full papers presented were carefully reviewed and selected from a tota...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Chung, Kyo-Il (Επιμελητής έκδοσης), Sohn, Kiwook (Επιμελητής έκδοσης), Yung, Moti (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Σειρά:Lecture Notes in Computer Science, 5379
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Smart Card and Secure Hardware(1)
  • Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation
  • Template Attacks on ECDSA
  • Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool
  • Wireless and Sensor Network Security(1)
  • Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network
  • Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
  • Securing Layer-2 Path Selection in Wireless Mesh Networks
  • Public Key Crypto Applications
  • Public Key Authentication with Memory Tokens
  • Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures
  • Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
  • Privacy and Anonymity
  • Sanitizable and Deletable Signature
  • An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data
  • Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
  • N/W Security and Intrusion Detection
  • Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512
  • A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model
  • A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence
  • Application Security and Trust Management
  • Image-Feature Based Human Identification Protocols on Limited Display Devices
  • Ternary Subset Difference Method and Its Quantitative Analysis
  • Data Deletion with Provable Security
  • Smart Card and Secure Hardware(2)
  • A Probing Attack on AES
  • On Avoiding ZVP-Attacks Using Isogeny Volcanoes
  • Security Analysis of DRBG Using HMAC in NIST SP 800-90
  • Wireless and Sensor Network Security(2)
  • Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module
  • An Improved Distributed Key Management Scheme in Wireless Sensor Networks
  • Protection Profile for Connected Interoperable DRM Framework.