Skip to main content
  • Conference proceedings
  • © 2007

Information Security Applications

8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4867)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISA: International Conference on Information Security Applications

Conference proceedings info: WISA 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. Public Key Crypto Applications

    1. Universal η T Pairing Algorithm over Arbitrary Extension Degree

      • Masaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto
      Pages 1-15
    2. Secret Signatures: How to Achieve Business Privacy Efficiently?

      • Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo
      Pages 30-47
  3. Biometrics/Information Hiding

    1. Implementation of BioAPI Conformance Test Suite Using BSP Testing Model

      • Jihyeon Jang, Stephen J. Elliott, Hakil Kim
      Pages 48-60
    2. Information Hiding in Software with Mixed Boolean-Arithmetic Transforms

      • Yongxin Zhou, Alec Main, Yuan X. Gu, Harold Johnson
      Pages 61-75
    3. Geometrically Invariant Image Watermarking in the DWT Domain

      • Shijun Xiang, Hyoung-Joong Kim
      Pages 76-90
  4. Secure Hardware

    1. Implementation of LSM-Based RBAC Module for Embedded System

      • Jae-Deok Lim, Sung-Kyong Un, Jeong-Nyeo Kim, ChoelHoon Lee
      Pages 91-101
  5. Secure Systems

    1. Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine

      • Yoshiki Sameshima, Hideaki Saisho, Tsutomu Matsumoto, Norihisa Komoda
      Pages 128-141
    2. An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks

      • Frederic Stumpf, Patrick Röder, Claudia Eckert
      Pages 142-156
    3. Detecting Motifs in System Call Sequences

      • William O. Wilson, Jan Feyereisl, Uwe Aickelin
      Pages 157-172
  6. Wireless and Mobile Security

    1. Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System

      • Toru Hashimoto, Takashi Itoh, Masazumi Ueba, Hisato Iwai, Hideichi Sasaoka, Kazukuni Kobara et al.
      Pages 173-187
    2. Breaking 104 Bit WEP in Less Than 60 Seconds

      • Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin
      Pages 188-202
    3. Efficient Implementation of the Pairing on Mobilephones Using BREW

      • Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka
      Pages 203-214
  7. Application Security/Secure Systems

    1. Security Analysis of MISTY1

      • Hidema Tanaka, Yasuo Hatano, Nobuyuki Sugio, Toshinobu Kaneko
      Pages 215-226
    2. A Generic Method for Secure SBox Implementation

      • Emmanuel Prouff, Matthieu Rivain
      Pages 227-244
  8. Access Control/DB Security

    1. Authorization Constraints Specification of RBAC

      • Lilong Han, Qingtan Liu, Zongkai Yang
      Pages 266-276

Other Volumes

  1. Information Security Applications

About this book

The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27–29, 2007. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We were very pleased and honored to serve as the Program Committee Co-chairs of WISA 2007. The Program Committee received 95 papers from 20 countries, and accepted 27 papers for the full presentation track. The papers were selected after an extensive and careful refereeing process in which each paper was reviewed by at least three members of the Program Committee. In addition to the contributed papers, the workshop had three special talks. Moti Yung gave a tutorial talk, entitled “Somebody You Know: The Fourth Factor of Authentication.” Kihong Park and Nasir Memon gave invited talks, entitled “Reactive Zero-Day Attack Protection” and “Securing Biometric T- plates,” respectively. Many people deserve our gratitude for their generous contributions to the success of the workshop. We would like to thank all the people involved in the technical program and in organizing the workshop. We are very grateful to the ProgramCommitteemembersandtheexternalrefereesfortheir timeande?orts in reviewing the submissions and selecting the accepted papers. We also express our special thanks to the Organizing Committee members for their hard work in organizing the workshop.

Editors and Affiliations

  • Department of Industrial Engineering, KAIST, Daejeon, Korea

    Sehun Kim

  • RSA Labs, EMC Corp. and Department of Computer Science, Columbia University,, USA

    Moti Yung

  • Div. Computer Information of Software, Hanshin University, Osan, South Korea

    Hyung-Woo Lee

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access