Skip to main content
  • Conference proceedings
  • © 2007

Information Security Applications

7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4298)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISA: International Conference on Information Security Applications

Conference proceedings info: WISA 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

  2. Public Key Crypto Applications/Virus Protection

    1. Controllable Ring Signatures

      • Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie
      Pages 1-14
    2. PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution

      • Ki Hun Lee, Yuna Kim, Sung Je Hong, Jong Kim
      Pages 45-59
  3. Cyber Indication/Intrusion Detection

    1. SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks

      • Jianqing Ma, Shiyong Zhang, Yiping Zhong, Xiaowen Tong
      Pages 60-73
  4. Biometrics/Security Trust Management

    1. Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords

      • Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Okyeon Yi, Namil Lee et al.
      Pages 100-109
    2. Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification

      • Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park
      Pages 110-120
  5. Secure Software/Systems

    1. Visualization of Permission Checks in Java Using Static Analysis

      • Yoonkyung Kim, Byeong-Mo Chang
      Pages 133-146
    2. Deployment of Virtual Machines in Lock-Keeper

      • Feng Cheng, Christoph Meinel
      Pages 147-159
  6. Smart Cards/Secure Hardware

    1. Investigations of Power Analysis Attacks and Countermeasures for ARIA

      • HyungSo Yoo, Christoph Herbst, Stefan Mangard, Elisabeth Oswald, SangJae Moon
      Pages 160-172
    2. Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols

      • Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim
      Pages 173-186
    3. A Novel Key Agreement Scheme in a Multiple Server Environment

      • Chin-Chen Chang, Chia-Chi Wu
      Pages 187-197
  7. Mobile Security

    1. Cost-Effective IDS Operating Scheme in MANETs

      • Youngok Jeong, Younggoo Han, Hyunwoo Kim, Woochul Shim, Jaehong Kim, Sehun Kim
      Pages 198-210
    2. Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6

      • Hyun-Sun Kang, Chang-Seop Park
      Pages 211-224
  8. DRM/Information Hiding/Ubiquitous Computing Security/P2P Security

    1. Distributed Management of OMA DRM Domains

      • Harikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Jan Martin Surminen
      Pages 237-251

Other Volumes

  1. Information Security Applications

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access