Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers

Bibliographic Details
Other Authors: Lee, Jae-Kwang (Editor), Yi, Okyeon (Editor), Yung, Moti (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2007, 2007
Edition:1st ed. 2007
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Privacy/Anonymity
  • Privacy Protection in PKIs: A Separation-of-Authority Approach
  • Three-Party Password Authenticated Key Agreement Resistant to Server Compromise
  • Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature
  • Secret Handshake with Multiple Groups
  • Internet and Wireless Security
  • Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs
  • EAP Using the Split Password-Based Authenticated Key Agreement
  • How Many Malicious Scanners Are in the Internet?
  • E-Passport: The Global Traceability Or How to Feel Like a UPS Package
  • Public Key Crypto Applications/Virus Protection
  • Controllable Ring Signatures
  • Efficient User Authentication and Key Agreement in Wireless Sensor Networks
  • Identity-Based Key Issuing Without Secure Channel in a Broad Area
  • PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution
  • Cyber Indication/Intrusion Detection
  • SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks
  • SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment
  • sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm
  • Biometrics/Security Trust Management
  • Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords
  • Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification
  • Quality Assurance for Evidence Collection in Network Forensics
  • Secure Software/Systems
  • Visualization of Permission Checks in Java Using Static Analysis
  • Deployment of Virtual Machines in Lock-Keeper
  • Smart Cards/Secure Hardware
  • Investigations of Power Analysis Attacks and Countermeasures for ARIA
  • Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols
  • A Novel Key Agreement Scheme in a Multiple Server Environment
  • Mobile Security
  • Cost-Effective IDS Operating Scheme in MANETs
  • Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6
  • A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones
  • DRM/Information Hiding/Ubiquitous Computing Security/P2P Security
  • Distributed Management of OMA DRM Domains
  • New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting
  • A Key Management Based on Multiple Regression in Hierarchical Sensor Network
  • Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks