Cargando…

Information Security Applications 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers /

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI)...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Lim, Chae Hoon (Editor ), Yung, Moti (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Security and Cryptology ; 3325
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Network/Computer Security
  • Impacts of Security Protocols on Real-Time Multimedia Communications
  • An Improvement on Privacy and Authentication in GSM
  • Encrypted Watermarks and Linux Laptop Security
  • Inconsistency Detection of Authorization Policies in Distributed Component Environment
  • Public Key Schemes I
  • Custodian-Hiding Verifiable Encryption
  • Proving Key Usage
  • Public Key Encryption with Conjunctive Field Keyword Search
  • Intrusion Detection I
  • A Probabilistic Method for Detecting Anomalous Program Behavior
  • Service Discrimination and Audit File Reduction for Effective Intrusion Detection
  • IDS False Alarm Filtering Using KNN Classifier
  • Watermarking/Anti-spamming
  • Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking
  • Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment
  • Public Key Schemes II
  • Efficient Authenticated Key Agreement Protocol for Dynamic Groups
  • A Ring Signature Scheme Using Bilinear Pairings
  • Verifiable Pairing and Its Applications
  • Intrusion Detection II
  • Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading
  • An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks
  • Application of Content Computing in Honeyfarm
  • Digital Rights Management
  • License Protection with a Tamper-Resistant Token
  • An Adaptive Approach to Hardware Alteration for Digital Rights Management
  • Dynamic Fingerprinting over Broadcast Using Revocation Scheme
  • Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels
  • e-Commerce Security
  • Vulnerability of a Mobile Payment System Proposed at WISA 2002
  • Fair Offline Payment Using Verifiable Encryption
  • A Limited-Used Key Generation Scheme for Internet Transactions
  • Efficient Implementation
  • Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes
  • Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II
  • Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors
  • Hyperelliptic Curve Coprocessors on a FPGA
  • Anonymous Communication
  • Key-Exchange Protocol Using Pre-agreed Session-ID
  • A New k-Anonymous Message Transmission Protocol
  • Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
  • Side-Channel Attacks
  • Side Channel Cryptanalysis on SEED
  • Secure and Efficient AES Software Implementation for Smart Cards
  • Practical Template Attacks
  • Evaluation and Improvement of the Tempest Fonts.