default search action
WISA 2006: Jeju Island, Korea
- Jae-Kwang Lee, Okyeon Yi, Moti Yung:
Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4298, Springer 2007, ISBN 978-3-540-71092-9
Public Key Crypto Applications/Virus Protection
- Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie:
Controllable Ring Signatures. 1-14 - Wen-Shenq Juang:
Efficient User Authentication and Key Agreement in Wireless Sensor Networks. 15-29 - Saeran Kwon, Sang-Ho Lee:
Identity-Based Key Issuing Without Secure Channel in a Broad Area. 30-44 - Ki Hun Lee, Yuna Kim, Sung Je Hong, Jong Kim:
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution. 45-59
Cyber Indication/Intrusion Detection
- Jianqing Ma, Shiyong Zhang, YiPing Zhong, Xiaowen Tong:
SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks. 60-73 - Jae-Chul Park, Bong-Nam Noh:
SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment. 74-82 - Seung-Hyun Paek, Yoon-Keun Oh, Do-Hoon Lee:
sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm. 83-99
Biometrics/Security Trust Management
- Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Okyeon Yi, Namil Lee, Kiyoung Moon:
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords. 100-109 - Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park:
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification. 110-120 - Bo-Chao Cheng, Huan Chen:
Quality Assurance for Evidence Collection in Network Forensics. 121-132
Secure Software/Systems
- Yoonkyung Kim, Byeong-Mo Chang:
Visualization of Permission Checks in Java Using Static Analysis. 133-146 - Feng Cheng, Christoph Meinel:
Deployment of Virtual Machines in Lock-Keeper. 147-159
Smart Cards/Secure Hardware
- HyungSo Yoo, Christoph Herbst, Stefan Mangard, Elisabeth Oswald, Sang-Jae Moon:
Investigations of Power Analysis Attacks and Countermeasures for ARIA. 160-172 - Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim:
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. 173-186 - Chin-Chen Chang, Chia-Chi Wu:
A Novel Key Agreement Scheme in a Multiple Server Environment. 187-197
Mobile Security
- Youngok Jeong, Younggoo Han, Hyunwoo Kim, Woochul Shim, Jaehong Kim, Sehun Kim:
Cost-Effective IDS Operating Scheme in MANETs. 198-210 - Hyun-Sun Kang, Chang-Seop Park:
Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6. 211-224 - Michiru Tanaka, Yoshimi Teshigawara:
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones. 225-236
DRM/Information Hiding/Ubiquitous Computing Security/P2P Security
- Harikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Jan Martin Surminen:
Distributed Management of OMA DRM Domains. 237-251 - Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa:
New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting. 252-266 - Mihui Kim, Inshil Doh, Kijoon Chae:
A Key Management Based on Multiple Regression in Hierarchical Sensor Network. 267-281 - Jabeom Gu, Jaehoon Nah, Cheoljoo Chae, Jae-Kwang Lee, Jongsoo Jang:
Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks. 282-296
Privacy/Anonymity
- Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jaeil Lee:
Privacy Protection in PKIs: A Separation-of-Authority Approach. 297-311 - Taekyoung Kwon, Dong Hoon Lee:
Three-Party Password Authenticated Key Agreement Resistant to Server Compromise. 312-323 - Takayuki Tobita, Hironori Yamamoto, Hiroshi Doi, Keigo Majima:
Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature. 324-338 - Naoyuki Yamashita, Keisuke Tanaka:
Secret Handshake with Multiple Groups. 339-348
Internet and Wireless Security
- Chanil Park, Junbeom Hur, Chanoe Kim, Young-joo Shin, Hyunsoo Yoon:
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs. 349-363 - Jongho Ryu:
EAP Using the Split Password-Based Authenticated Key Agreement. 364-380 - Hiroaki Kikuchi, Masato Terada:
How Many Malicious Scanners Are in the Internet? 381-390 - Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi:
E-Passport: The Global Traceability Or How to Feel Like a UPS Package. 391-404
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.