Cargando…

Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers /

The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27-29, 2007. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI)...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Sehun, Kim (Editor ), Yung, Moti (Editor ), Lee, Hyung-Woo (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:Security and Cryptology ; 4867
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Public Key Crypto Applications
  • Universal ? T Pairing Algorithm over Arbitrary Extension Degree
  • Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction
  • Secret Signatures: How to Achieve Business Privacy Efficiently?
  • Biometrics/Information Hiding
  • Implementation of BioAPI Conformance Test Suite Using BSP Testing Model
  • Information Hiding in Software with Mixed Boolean-Arithmetic Transforms
  • Geometrically Invariant Image Watermarking in the DWT Domain
  • Secure Hardware
  • Implementation of LSM-Based RBAC Module for Embedded System
  • Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations
  • A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor
  • Secure Systems
  • Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine
  • An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks
  • Detecting Motifs in System Call Sequences
  • Wireless and Mobile Security
  • Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System
  • Breaking 104 Bit WEP in Less Than 60 Seconds
  • Efficient Implementation of the Pairing on Mobilephones Using BREW
  • Application Security/Secure Systems
  • Security Analysis of MISTY1
  • A Generic Method for Secure SBox Implementation
  • On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences
  • Access Control/DB Security
  • Authorization Constraints Specification of RBAC
  • Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk
  • A Compositional Multiple Policies Operating System Security Model
  • Smart Cards/Secure Systems
  • Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones
  • Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures
  • Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC
  • Anonymity and P2P Security
  • Risk & Distortion Based K-Anonymity
  • Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System
  • ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.