Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers

Author:   Kijoon Chae ,  Moti Yung
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2004 ed.
Volume:   2908
ISBN:  

9783540208273


Pages:   512
Publication Date:   15 January 2004
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $237.47 Quantity:  
Add to Cart

Share |

Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers


Add your own review!

Overview

Full Product Details

Author:   Kijoon Chae ,  Moti Yung
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2004 ed.
Volume:   2908
Dimensions:   Width: 15.50cm , Height: 2.60cm , Length: 23.50cm
Weight:   1.600kg
ISBN:  

9783540208273


ISBN 10:   3540208275
Pages:   512
Publication Date:   15 January 2004
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Network Security.- Model Checking of Security Protocols with Pre-configuration.- Remote Access VPN with Port Protection Function by Mobile Codes.- A Role of DEVS Simulation for Information Assurance.- Mobile Security.- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes.- Reliable Cascaded Delegation Scheme for Mobile Agent Environments.- Practical Solution for Location Privacy in Mobile IPv6.- Intrusion Detection.- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection.- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System.- Towards a Global Security Architecture for Intrusion Detection and Reaction Management.- Internet Security.- Intrusion-Tolerant System Design for Web Server Survivability.- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access.- An Automatic Security Evaluation System for IPv6 Network.- Secure Software, Hardware, and Systems I.- A Location Privacy Protection Mechanism for Smart Space.- Secure System Architecture Based on Dynamic Resource Reallocation.- Fair Exchange with Guardian Angels.- Secure Software, Hardware, and Systems II.- Sign-Based Differential Power Analysis.- Asymmetric Watermarking Scheme Using Permutation Braids.- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m ).- E-commerce Security.- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction.- Multi-dimensional Hash Chain For Sealed-Bid Auction.- An Improved Forward Integrity Protocol for Mobile Agents.- Digital Rights Management.- Taming Trusted Platforms by Operating System Design.- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation.- Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes.- Biometrics and Human Interfaces I.- 3D Face Recognition under Pose Varying Environments.- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint.- Fingerprint-Based Authentication for USB Token Systems.- Biometrics and Human Interfaces II.- Iris Recognition System Using Wavelet Packet and Support Vector Machines.- Biometrics Identification and Verification Using Projection-Based Face Recognition System.- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification.- Public Key Cryptography / Key Management.- E-MHT. An Efficient Protocol for Certificate Status Checking.- A Comment on Group Independent Threshold Sharing.- Automation-Considered Logic of Authentication and Key Distribution.- Applied Cryptography.- The MESH Block Ciphers.- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves.- Constructing and Cryptanalysis of a 16 x 16 Binary Matrix as a Diffusion Layer.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List