Cargando…

Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008. The 24 revised full papers presented were carefully reviewed and selected from a tota...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Sohn, Kiwook (Editor ), Yung, Moti (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Security and Cryptology ; 5379
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Smart Card and Secure Hardware(1)
  • Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation
  • Template Attacks on ECDSA
  • Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool
  • Wireless and Sensor Network Security(1)
  • Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network
  • Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
  • Securing Layer-2 Path Selection in Wireless Mesh Networks
  • Public Key Crypto Applications
  • Public Key Authentication with Memory Tokens
  • Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures
  • Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
  • Privacy and Anonymity
  • Sanitizable and Deletable Signature
  • An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data
  • Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
  • N/W Security and Intrusion Detection
  • Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512
  • A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model
  • A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence
  • Application Security and Trust Management
  • Image-Feature Based Human Identification Protocols on Limited Display Devices
  • Ternary Subset Difference Method and Its Quantitative Analysis
  • Data Deletion with Provable Security
  • Smart Card and Secure Hardware(2)
  • A Probing Attack on AES
  • On Avoiding ZVP-Attacks Using Isogeny Volcanoes
  • Security Analysis of DRBG Using HMAC in NIST SP 800-90
  • Wireless and Sensor Network Security(2)
  • Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module
  • An Improved Distributed Key Management Scheme in Wireless Sensor Networks
  • Protection Profile for Connected Interoperable DRM Framework.