+612 9045 4394
 
CHECKOUT
Information Security Applications : 4th International Workshop, Wisa 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers - Kijoon Chae

Information Security Applications

4th International Workshop, Wisa 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers

By: Kijoon Chae (Editor), Moti Yung (Editor)

Paperback

Published: 15th January 2004
Ships: 15 business days
15 business days
$181.29
or 4 easy payments of $45.32 with Learn more

The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and TelecommunicationsResearchInstitute(ETRI), andtheMinistryofInformation and Communication (MIC). The workshop was held in Jeju Island, Korea - ring August 25-27, 2003. This international workshop provided ample technical sessions covering a large spectrum of information security applications. Subjects covered included network/mobile security, electronic commerce security, digital rights management, intrusion detection, secure systems and applications, bio- trics and human interfaces, public key cryptography, and applied cryptography. The program committee received 200 papers from 23 countries (representing most geographic areas where security and applied cryptography research is c- ductedthroughouttheworld).Eachsubmittedpaperwaspeer-reviewedbythree program committee members. This year, we had two tracks: long and short p- sentation tracks. We selected 36 papers for the long presentation track and 34 papers for the short presentation tracks. This volume contains revised versions of papers accepted for the long presentation track. We would like to note that getting accepted to both tracks was an achievement to be proud of, given the competitive nature of WISA this year. Papers in the short presentation track were only published in the WISA preproceedings as preliminary notes; ext- dedversionsofthesenotesmaybepublishedbyfutureconferencesorworkshops.

Model Checking of Security Protocols with Pre-configurationp. 1
Remote Access VPN with Port Protection Function by Mobile Codesp. 16
A Role of DEVS Simulation for Information Assurancep. 27
Enhancing Grid Security Infrastructure to Support Mobile Computing Nodesp. 42
Reliable Cascaded Delegation Scheme for Mobile Agent Environmentsp. 55
Practical Solution for Location Privacy in Mobile IPv6p. 69
CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detectionp. 84
Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection Systemp. 97
Towards a Global Security Architecture for Intrusion Detection and Reaction Managementp. 111
Intrusion-Tolerant System Design for Web Server Survivabilityp. 124
PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Accessp. 135
An Automatic Security Evaluation System for IPv6 Networkp. 150
A Location Privacy Protection Mechanism for Smart Spacep. 162
Secure System Architecture Based on Dynamic Resource Reallocationp. 174
Fair Exchange with Guardian Angelsp. 188
Sign-Based Differential Power Analysisp. 203
Asymmetric Watermarking Scheme Using Permutation Braidsp. 217
Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2[superscript m])p. 227
Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auctionp. 244
Multi-dimensional Hash Chain for Sealed-Bid Auctionp. 257
An Improved Forward Integrity Protocol for Mobile Agentsp. 272
Taming "Trusted Platforms" by Operating System Designp. 286
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscationp. 303
Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemesp. 317
3D Face Recognition under Pose Varying Environmentsp. 333
An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprintp. 348
Fingerprint-Based Authentication for USB Token Systemsp. 355
Iris Recognition System Using Wavelet Packet and Support Vector Machinesp. 365
Biometrics Identification and Verification Using Projection-Based Face Recognition Systemp. 380
Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verificationp. 395
E-MHT. An Efficient Protocol for Certificate Status Checkingp. 410
A Comment on Group Independent Threshold Sharingp. 425
Automation-Considered Logic of Authentication and Key Distributionp. 442
The MESH Block Ciphersp. 458
Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curvesp. 474
Constructing and Cryptanalysis of a 16 x 16 Binary Matrix as a Diffusion Layerp. 489
Author Indexp. 505
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540208273
ISBN-10: 3540208275
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 512
Published: 15th January 2004
Publisher: SPRINGER VERLAG GMBH
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.67
Weight (kg): 0.73