A word in response to the corona virus crisis: Your print orders will be fulfilled, even in these challenging times. If you don’t want to wait – have a look at our ebook offers and start reading immediately.

Lecture Notes in Computer Science

Information Security Applications

4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers

Editors: Chae, Kijoon, Yung, Moti (Eds.)

Free Preview

Buy this book

eBook $109.00
price for USA in USD (gross)
  • ISBN 978-3-540-24591-9
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $149.00
price for USA in USD
  • ISBN 978-3-540-20827-3
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and TelecommunicationsResearchInstitute(ETRI),andtheMinistryofInformation and Communication (MIC). The workshop was held in Jeju Island, Korea - ring August 25–27, 2003. This international workshop provided ample technical sessions covering a large spectrum of information security applications. Subjects covered included network/mobile security, electronic commerce security, digital rights management, intrusion detection, secure systems and applications, bio- trics and human interfaces, public key cryptography, and applied cryptography. The program committee received 200 papers from 23 countries (representing most geographic areas where security and applied cryptography research is c- ductedthroughouttheworld).Eachsubmittedpaperwaspeer-reviewedbythree program committee members. This year, we had two tracks: long and short p- sentation tracks. We selected 36 papers for the long presentation track and 34 papers for the short presentation tracks. This volume contains revised versions of papers accepted for the long presentation track. We would like to note that getting accepted to both tracks was an achievement to be proud of, given the competitive nature of WISA this year. Papers in the short presentation track were only published in the WISA preproceedings as preliminary notes; ext- dedversionsofthesenotesmaybepublishedbyfutureconferencesorworkshops.

Table of contents (36 chapters)

Table of contents (36 chapters)
  • Model Checking of Security Protocols with Pre-configuration

    Pages 1-15

    Kim, Kyoil (et al.)

  • Remote Access VPN with Port Protection Function by Mobile Codes

    Pages 16-26

    Shiraishi, Yoshiaki (et al.)

  • A Role of DEVS Simulation for Information Assurance

    Pages 27-41

    Chi, Sung-Do (et al.)

  • Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes

    Pages 42-54

    Lam, Kwok-Yan (et al.)

  • Reliable Cascaded Delegation Scheme for Mobile Agent Environments

    Pages 55-68

    Lee, Hyun-suk (et al.)

Buy this book

eBook $109.00
price for USA in USD (gross)
  • ISBN 978-3-540-24591-9
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $149.00
price for USA in USD
  • ISBN 978-3-540-20827-3
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Information Security Applications
Book Subtitle
4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers
Editors
  • Kijoon Chae
  • Moti Yung
Series Title
Lecture Notes in Computer Science
Series Volume
2908
Copyright
2004
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-24591-9
DOI
10.1007/b95188
Softcover ISBN
978-3-540-20827-3
Series ISSN
0302-9743
Edition Number
1
Number of Pages
XII, 512
Topics