Skip to main content
  • Conference proceedings
  • © 2004

Information Security Applications

4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2908)

Conference series link(s): WISA: International Conference on Information Security Applications

Conference proceedings info: WISA 2003.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

  2. Network Security

    1. Model Checking of Security Protocols with Pre-configuration

      • Kyoil Kim, Jacob A. Abraham, Jayanta Bhadra
      Pages 1-15
    2. Remote Access VPN with Port Protection Function by Mobile Codes

      • Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii
      Pages 16-26
    3. A Role of DEVS Simulation for Information Assurance

      • Sung-Do Chi, Jong Sou Park, Jang-Se Lee
      Pages 27-41
  3. Mobile Security

    1. Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes

      • Kwok-Yan Lam, Xi-Bin Zhao, Siu-Leung Chung, Ming Gu, Jia-Guang Sun
      Pages 42-54
    2. Reliable Cascaded Delegation Scheme for Mobile Agent Environments

      • Hyun-suk Lee, Hyeog Man Kwon, Young Ik Eom
      Pages 55-68
    3. Practical Solution for Location Privacy in Mobile IPv6

      • SuGil Choi, Kwangjo Kim, ByeongGon Kim
      Pages 69-83
  4. Intrusion Detection

    1. CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection

      • Jin Suk Kim, Hohn Gyu Lee, Sungbo Seo, Keun Ho Ryu
      Pages 84-96
    2. Towards a Global Security Architecture for Intrusion Detection and Reaction Management

      • Renaud Bidou, Julien Bourgeois, Francois Spies
      Pages 111-123
  5. Internet Security

    1. Intrusion-Tolerant System Design for Web Server Survivability

      • Dae-Sik Choi, Eul Gyu Im, Cheol-Won Lee
      Pages 124-134
    2. PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access

      • Paulo S. Pagliusi, Chris J. Mitchell
      Pages 135-149
    3. An Automatic Security Evaluation System for IPv6 Network

      • Jaehoon Nah, Hyeokchan Kwon, Sungwon Sohn, Cheehang Park, Chimoon Han
      Pages 150-161
  6. Secure Software, Hardware, and Systems I

    1. A Location Privacy Protection Mechanism for Smart Space

      • Yeongsub Cho, Sangrae Cho, Daeseon Choi, Seunghun Jin, Kyoil Chung, Cheehang Park
      Pages 162-173
    2. Secure System Architecture Based on Dynamic Resource Reallocation

      • Byoung Joon Min, Sung Ki Kim, Joong Sup Choi
      Pages 174-187
    3. Fair Exchange with Guardian Angels

      • Gildas Avoine, Serge Vaudenay
      Pages 188-202
  7. Secure Software, Hardware, and Systems II

    1. Sign-Based Differential Power Analysis

      • Roman Novak
      Pages 203-216
    2. Asymmetric Watermarking Scheme Using Permutation Braids

      • Geun-Sil Song, Mi-Ae Kim, Won-Hyung Lee
      Pages 217-226
    3. Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2m)

      • Johann Großschädl, Guy-Armand Kamendje
      Pages 227-243
  8. E-commerce Security

    1. Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction

      • Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan
      Pages 244-256

Other Volumes

  1. Information Security Applications

About this book

The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and TelecommunicationsResearchInstitute(ETRI),andtheMinistryofInformation and Communication (MIC). The workshop was held in Jeju Island, Korea - ring August 25–27, 2003. This international workshop provided ample technical sessions covering a large spectrum of information security applications. Subjects covered included network/mobile security, electronic commerce security, digital rights management, intrusion detection, secure systems and applications, bio- trics and human interfaces, public key cryptography, and applied cryptography. The program committee received 200 papers from 23 countries (representing most geographic areas where security and applied cryptography research is c- ductedthroughouttheworld).Eachsubmittedpaperwaspeer-reviewedbythree program committee members. This year, we had two tracks: long and short p- sentation tracks. We selected 36 papers for the long presentation track and 34 papers for the short presentation tracks. This volume contains revised versions of papers accepted for the long presentation track. We would like to note that getting accepted to both tracks was an achievement to be proud of, given the competitive nature of WISA this year. Papers in the short presentation track were only published in the WISA preproceedings as preliminary notes; ext- dedversionsofthesenotesmaybepublishedbyfutureconferencesorworkshops.

Editors and Affiliations

  • Dept. of Computer Science and Engineering, Ewha Womans University, Korea

    Ki-Joon Chae

  • Computer Science Department, Google Inc. and Columbia University, New York, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access