Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers /
The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27-29, 2007. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI)...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Edición: | 1st ed. 2007. |
Colección: | Security and Cryptology ;
4867 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Public Key Crypto Applications
- Universal ? T Pairing Algorithm over Arbitrary Extension Degree
- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction
- Secret Signatures: How to Achieve Business Privacy Efficiently?
- Biometrics/Information Hiding
- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model
- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms
- Geometrically Invariant Image Watermarking in the DWT Domain
- Secure Hardware
- Implementation of LSM-Based RBAC Module for Embedded System
- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations
- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor
- Secure Systems
- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine
- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks
- Detecting Motifs in System Call Sequences
- Wireless and Mobile Security
- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System
- Breaking 104 Bit WEP in Less Than 60 Seconds
- Efficient Implementation of the Pairing on Mobilephones Using BREW
- Application Security/Secure Systems
- Security Analysis of MISTY1
- A Generic Method for Secure SBox Implementation
- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences
- Access Control/DB Security
- Authorization Constraints Specification of RBAC
- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk
- A Compositional Multiple Policies Operating System Security Model
- Smart Cards/Secure Systems
- Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones
- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures
- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC
- Anonymity and P2P Security
- Risk & Distortion Based K-Anonymity
- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System
- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems.