Online Public Access Catalogue
Amazon cover image
Image from Amazon.com

Information Security Applications [electronic resource] : 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers / edited by Jae Kwang Lee, Okyeon Yi, Moti Yung.

By: Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 4298Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007Description: XIV, 406 p. Also available online. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540710936
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.82 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Public Key Crypto Applications/Virus Protection -- Controllable Ring Signatures -- Efficient User Authentication and Key Agreement in Wireless Sensor Networks -- Identity-Based Key Issuing Without Secure Channel in a Broad Area -- PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution -- Cyber Indication/Intrusion Detection -- SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks -- SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment -- sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm -- Biometrics/Security Trust Management -- Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords -- Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification -- Quality Assurance for Evidence Collection in Network Forensics -- Secure Software/Systems -- Visualization of Permission Checks in Java Using Static Analysis -- Deployment of Virtual Machines in Lock-Keeper -- Smart Cards/Secure Hardware -- Investigations of Power Analysis Attacks and Countermeasures for ARIA -- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols -- A Novel Key Agreement Scheme in a Multiple Server Environment -- Mobile Security -- Cost-Effective IDS Operating Scheme in MANETs -- Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6 -- A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones -- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security -- Distributed Management of OMA DRM Domains -- New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting -- A Key Management Based on Multiple Regression in Hierarchical Sensor Network -- Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks -- Privacy/Anonymity -- Privacy Protection in PKIs: A Separation-of-Authority Approach -- Three-Party Password Authenticated Key Agreement Resistant to Server Compromise -- Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature -- Secret Handshake with Multiple Groups -- Internet and Wireless Security -- Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs -- EAP Using the Split Password-Based Authenticated Key Agreement -- How Many Malicious Scanners Are in the Internet? -- E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
In: Springer eBooksSummary: The 7th International Workshop on Information Security Applications (WISA 2006) was held on Jeju Island, Korea during August 28-30, 2006. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We were very pleased and honored to serve as the Program Committee Co-chairs of WISA 2006. The Program Committee received 146 papers from 11 countries, and accepted 31 papers for the full presentation track and 18 - pers for a short presentation track. The papers were selected after an extensive andcarefulrefereeingprocess inwhich eachpaper wasreviewedby atleastthree members of the Program Committee. In addition to the contributed papers, the workshop had three special talks. MotiYunggaveatutorialtalk,entitled“PhishingandAuthenticationinBanks.” Sushil Jajodia and Seong G. Kong gave invited talks in the full presentation track, entitled “Topological Analysis of Network Attack Vulnerability” and “Imaging Beyond the Visible Spectrum for Personal Identi?cation and Threat Detection,” respectively. Many people deserve our gratitude for their generous contributions to the success of the workshop. We would like to thank all the people involved in the technical program and in organizing the workshop. We are very grateful to the ProgramCommitteemembersandtheexternalrefereesfortheir timeande?orts in reviewing the submissions and selecting the accepted papers. We also express our special thanks to the Organizing Committee members for their hard work in organizing the workshop.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Public Key Crypto Applications/Virus Protection -- Controllable Ring Signatures -- Efficient User Authentication and Key Agreement in Wireless Sensor Networks -- Identity-Based Key Issuing Without Secure Channel in a Broad Area -- PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution -- Cyber Indication/Intrusion Detection -- SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks -- SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment -- sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm -- Biometrics/Security Trust Management -- Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords -- Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification -- Quality Assurance for Evidence Collection in Network Forensics -- Secure Software/Systems -- Visualization of Permission Checks in Java Using Static Analysis -- Deployment of Virtual Machines in Lock-Keeper -- Smart Cards/Secure Hardware -- Investigations of Power Analysis Attacks and Countermeasures for ARIA -- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols -- A Novel Key Agreement Scheme in a Multiple Server Environment -- Mobile Security -- Cost-Effective IDS Operating Scheme in MANETs -- Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6 -- A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones -- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security -- Distributed Management of OMA DRM Domains -- New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting -- A Key Management Based on Multiple Regression in Hierarchical Sensor Network -- Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks -- Privacy/Anonymity -- Privacy Protection in PKIs: A Separation-of-Authority Approach -- Three-Party Password Authenticated Key Agreement Resistant to Server Compromise -- Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature -- Secret Handshake with Multiple Groups -- Internet and Wireless Security -- Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs -- EAP Using the Split Password-Based Authenticated Key Agreement -- How Many Malicious Scanners Are in the Internet? -- E-Passport: The Global Traceability Or How to Feel Like a UPS Package.

The 7th International Workshop on Information Security Applications (WISA 2006) was held on Jeju Island, Korea during August 28-30, 2006. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We were very pleased and honored to serve as the Program Committee Co-chairs of WISA 2006. The Program Committee received 146 papers from 11 countries, and accepted 31 papers for the full presentation track and 18 - pers for a short presentation track. The papers were selected after an extensive andcarefulrefereeingprocess inwhich eachpaper wasreviewedby atleastthree members of the Program Committee. In addition to the contributed papers, the workshop had three special talks. MotiYunggaveatutorialtalk,entitled“PhishingandAuthenticationinBanks.” Sushil Jajodia and Seong G. Kong gave invited talks in the full presentation track, entitled “Topological Analysis of Network Attack Vulnerability” and “Imaging Beyond the Visible Spectrum for Personal Identi?cation and Threat Detection,” respectively. Many people deserve our gratitude for their generous contributions to the success of the workshop. We would like to thank all the people involved in the technical program and in organizing the workshop. We are very grateful to the ProgramCommitteemembersandtheexternalrefereesfortheir timeande?orts in reviewing the submissions and selecting the accepted papers. We also express our special thanks to the Organizing Committee members for their hard work in organizing the workshop.

There are no comments on this title.

to post a comment.