Read While You Wait - Get immediate ebook access, if available*, when you order a print book

Security and Cryptology

Information Security Applications

8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers

Editors: Sehun, Kim, Yung, Moti, Lee, Hyung-Woo (Eds.)

Free Preview
  • Complete with Springer’s trademark online files and updates, this fascinating text constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, in August 2007.
  • The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions.
  • The papers are organized in topical sections that include material on Public Key Crypto Applications, Biometrics/Information Hiding, Secure Hardware, Secure Systems, and Wireless and Mobile Security.
  • Also included are secions on Application Security/Secure Systems, Access Control/DB Security, Smart Cards/Secure Systems and Anonymity and P2P Security.
  • A must-read for both researchers and professionals.
see more benefits

Buy this book

eBook $89.00
price for USA in USD
  • ISBN 978-3-540-77535-5
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $119.00
price for USA in USD
About this book

The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27–29, 2007. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We were very pleased and honored to serve as the Program Committee Co-chairs of WISA 2007. The Program Committee received 95 papers from 20 countries, and accepted 27 papers for the full presentation track. The papers were selected after an extensive and careful refereeing process in which each paper was reviewed by at least three members of the Program Committee. In addition to the contributed papers, the workshop had three special talks. Moti Yung gave a tutorial talk, entitled “Somebody You Know: The Fourth Factor of Authentication.” Kihong Park and Nasir Memon gave invited talks, entitled “Reactive Zero-Day Attack Protection” and “Securing Biometric T- plates,” respectively. Many people deserve our gratitude for their generous contributions to the success of the workshop. We would like to thank all the people involved in the technical program and in organizing the workshop. We are very grateful to the ProgramCommitteemembersandtheexternalrefereesfortheir timeande?orts in reviewing the submissions and selecting the accepted papers. We also express our special thanks to the Organizing Committee members for their hard work in organizing the workshop.

Table of contents (27 chapters)

Table of contents (27 chapters)
  • Universal η T Pairing Algorithm over Arbitrary Extension Degree

    Pages 1-15

    Shirase, Masaaki (et al.)

  • Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction

    Pages 16-29

    Wu, Wei (et al.)

  • Secret Signatures: How to Achieve Business Privacy Efficiently?

    Pages 30-47

    Lee, Byoungcheon (et al.)

  • Implementation of BioAPI Conformance Test Suite Using BSP Testing Model

    Pages 48-60

    Jang, Jihyeon (et al.)

  • Information Hiding in Software with Mixed Boolean-Arithmetic Transforms

    Pages 61-75

    Zhou, Yongxin (et al.)

Buy this book

eBook $89.00
price for USA in USD
  • ISBN 978-3-540-77535-5
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $119.00
price for USA in USD
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Information Security Applications
Book Subtitle
8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
Editors
  • Kim Sehun
  • Moti Yung
  • Hyung-Woo Lee
Series Title
Security and Cryptology
Series Volume
4867
Copyright
2007
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-77535-5
DOI
10.1007/978-3-540-77535-5
Softcover ISBN
978-3-540-77534-8
Edition Number
1
Number of Pages
XIII, 388
Topics

*immediately available upon purchase as print book shipments may be delayed due to the COVID-19 crisis. ebook access is temporary and does not include ownership of the ebook. Only valid for books with an ebook version. Springer Reference Works and instructor copies are not included.