Jae-Kwang Lee (Volume ed.) / Okyeon Yi / Moti Yung
Information Security Applications
7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Herausgegeben:Lee, Jae-Kwang; Yi, Okyeon; Yung, Moti
Jae-Kwang Lee (Volume ed.) / Okyeon Yi / Moti Yung
Information Security Applications
7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Herausgegeben:Lee, Jae-Kwang; Yi, Okyeon; Yung, Moti
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006. Coverage in the 30 revised full papers includes public key crypto applications and virus protection, cyber indication and intrusion detection, biometrics and security trust management, secure software and systems, smart cards and secure hardware, and mobile security.
Andere Kunden interessierten sich auch für
- Moti Yung / Peng Liu / Dongdai Lin (Volume editor)Information Security and Cryptology37,99 €
- Kyo-Il Chung / Kiwook Sohn / Moti Yung (Volume editor)Information Security Applications37,99 €
- Kim Sehun / Moti Yung / Hyung-Woo Lee (eds.)Information Security Applications37,99 €
- Jooseok Song / Taekyoung Kwon (eds.)Information Security Applications42,99 €
- OkamotoInformation Security42,99 €
- Masayuki AbeTopics in Cryptology - CT-RSA 200742,99 €
- Carlisle Adams / Ali Miri / Michael Wiener (eds.)Selected Areas in Cryptography37,99 €
-
-
-
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006. Coverage in the 30 revised full papers includes public key crypto applications and virus protection, cyber indication and intrusion detection, biometrics and security trust management, secure software and systems, smart cards and secure hardware, and mobile security.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 4298
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12025299, 978-3-540-71092-9
- 2007
- Erscheinungstermin: 30. März 2007
- Englisch
- Abmessung: 240mm x 156mm x 32mm
- Gewicht: 646g
- ISBN-13: 9783540710929
- ISBN-10: 3540710922
- Artikelnr.: 22762620
- Herstellerkennzeichnung
- Springer Fachmedien Wiesbaden GmbH
- Abraham-Lincoln-Str. 46
- 65189 Wiesbaden
- info@bod.de
- +49 (0611) 7878-0
- Lecture Notes in Computer Science 4298
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12025299, 978-3-540-71092-9
- 2007
- Erscheinungstermin: 30. März 2007
- Englisch
- Abmessung: 240mm x 156mm x 32mm
- Gewicht: 646g
- ISBN-13: 9783540710929
- ISBN-10: 3540710922
- Artikelnr.: 22762620
- Herstellerkennzeichnung
- Springer Fachmedien Wiesbaden GmbH
- Abraham-Lincoln-Str. 46
- 65189 Wiesbaden
- info@bod.de
- +49 (0611) 7878-0
Jae-Kwang Lee, Hannam University, Daejeon, Korea / Okyeon Yi, Kookmin University, Seoul, Korea / Moti Yung, Columbia University, New York, USA
Public Key Crypto Applications/Virus Protection.- Controllable Ring Signatures.- Efficient User Authentication and Key Agreement in Wireless Sensor Networks.- Identity-Based Key Issuing Without Secure Channel in a Broad Area.- PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution.- Cyber Indication/Intrusion Detection.- SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks.- SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment.- sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm.- Biometrics/Security Trust Management.- Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.- Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification.- Quality Assurance for Evidence Collection in Network Forensics.- Secure Software/Systems.- Visualization of Permission Checks in Java Using Static Analysis.- Deployment of Virtual Machines in Lock-Keeper.- Smart Cards/Secure Hardware.- Investigations of Power Analysis Attacks and Countermeasures for ARIA.- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols.- A Novel Key Agreement Scheme in a Multiple Server Environment.- Mobile Security.- Cost-Effective IDS Operating Scheme in MANETs.- Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6.- A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones.- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security.- Distributed Management of OMA DRM Domains.- New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting.- A Key Management Based on Multiple Regression in Hierarchical Sensor Network.- Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks.- Privacy/Anonymity.- Privacy Protection in PKIs: A Separation-of-Authority Approach.- Three-Party Password Authenticated Key Agreement Resistant to Server Compromise.- Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature.- Secret Handshake with Multiple Groups.- Internet and Wireless Security.- Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs.- EAP Using the Split Password-Based Authenticated Key Agreement.- How Many Malicious Scanners Are in the Internet?.- E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
Public Key Crypto Applications/Virus Protection.- Controllable Ring Signatures.- Efficient User Authentication and Key Agreement in Wireless Sensor Networks.- Identity-Based Key Issuing Without Secure Channel in a Broad Area.- PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution.- Cyber Indication/Intrusion Detection.- SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks.- SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment.- sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm.- Biometrics/Security Trust Management.- Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.- Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification.- Quality Assurance for Evidence Collection in Network Forensics.- Secure Software/Systems.- Visualization of Permission Checks in Java Using Static Analysis.- Deployment of Virtual Machines in Lock-Keeper.- Smart Cards/Secure Hardware.- Investigations of Power Analysis Attacks and Countermeasures for ARIA.- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols.- A Novel Key Agreement Scheme in a Multiple Server Environment.- Mobile Security.- Cost-Effective IDS Operating Scheme in MANETs.- Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6.- A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones.- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security.- Distributed Management of OMA DRM Domains.- New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting.- A Key Management Based on Multiple Regression in Hierarchical Sensor Network.- Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks.- Privacy/Anonymity.- Privacy Protection in PKIs: A Separation-of-Authority Approach.- Three-Party Password Authenticated Key Agreement Resistant to Server Compromise.- Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature.- Secret Handshake with Multiple Groups.- Internet and Wireless Security.- Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs.- EAP Using the Split Password-Based Authenticated Key Agreement.- How Many Malicious Scanners Are in the Internet?.- E-Passport: The Global Traceability Or How to Feel Like a UPS Package.