Online Library TheLib.net » Information Security Applications: 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers
cover of the book Information Security Applications: 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers

Ebook: Information Security Applications: 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers

00
27.01.2024
0
0

The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and TelecommunicationsResearchInstitute(ETRI),andtheMinistryofInformation and Communication (MIC). The workshop was held in Jeju Island, Korea - ring August 25–27, 2003. This international workshop provided ample technical sessions covering a large spectrum of information security applications. Subjects covered included network/mobile security, electronic commerce security, digital rights management, intrusion detection, secure systems and applications, bio- trics and human interfaces, public key cryptography, and applied cryptography. The program committee received 200 papers from 23 countries (representing most geographic areas where security and applied cryptography research is c- ductedthroughouttheworld).Eachsubmittedpaperwaspeer-reviewedbythree program committee members. This year, we had two tracks: long and short p- sentation tracks. We selected 36 papers for the long presentation track and 34 papers for the short presentation tracks. This volume contains revised versions of papers accepted for the long presentation track. We would like to note that getting accepted to both tracks was an achievement to be proud of, given the competitive nature of WISA this year. Papers in the short presentation track were only published in the WISA preproceedings as preliminary notes; ext- dedversionsofthesenotesmaybepublishedbyfutureconferencesorworkshops.




This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Information Security Applications, WISA 2003, held on Jeju Island, Korea, in August 2003.

The 36 revised full papers were carefully reviewed and selected from 200 submissions. The papers are organized in topical sections on network security, mobile security; intrusion detection; Internet security; secure software, hardware, and systems; e-commerce security; digital rights management; biometrics and human interfaces; public key cryptography and key management; and applied cryptography.




This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Information Security Applications, WISA 2003, held on Jeju Island, Korea, in August 2003.

The 36 revised full papers were carefully reviewed and selected from 200 submissions. The papers are organized in topical sections on network security, mobile security; intrusion detection; Internet security; secure software, hardware, and systems; e-commerce security; digital rights management; biometrics and human interfaces; public key cryptography and key management; and applied cryptography.


Content:
Front Matter....Pages -
Model Checking of Security Protocols with Pre-configuration....Pages 1-15
Remote Access VPN with Port Protection Function by Mobile Codes....Pages 16-26
A Role of DEVS Simulation for Information Assurance....Pages 27-41
Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes....Pages 42-54
Reliable Cascaded Delegation Scheme for Mobile Agent Environments....Pages 55-68
Practical Solution for Location Privacy in Mobile IPv6....Pages 69-83
CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection....Pages 84-96
Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System....Pages 97-110
Towards a Global Security Architecture for Intrusion Detection and Reaction Management....Pages 111-123
Intrusion-Tolerant System Design for Web Server Survivability....Pages 124-134
PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access....Pages 135-149
An Automatic Security Evaluation System for IPv6 Network....Pages 150-161
A Location Privacy Protection Mechanism for Smart Space....Pages 162-173
Secure System Architecture Based on Dynamic Resource Reallocation....Pages 174-187
Fair Exchange with Guardian Angels....Pages 188-202
Sign-Based Differential Power Analysis....Pages 203-216
Asymmetric Watermarking Scheme Using Permutation Braids....Pages 217-226
Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction....Pages 227-243
Multi-dimensional Hash Chain For Sealed-Bid Auction....Pages 244-256
An Improved Forward Integrity Protocol for Mobile Agents....Pages 257-271
Taming “Trusted Platforms” by Operating System Design....Pages 272-285
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation....Pages 286-302
Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes....Pages 303-316
3D Face Recognition under Pose Varying Environments....Pages 317-332
An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint....Pages 333-347
Fingerprint-Based Authentication for USB Token Systems....Pages 348-354
Iris Recognition System Using Wavelet Packet and Support Vector Machines....Pages 355-364
Biometrics Identification and Verification Using Projection-Based Face Recognition System....Pages 365-379
Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification....Pages 380-394
E-MHT. An Efficient Protocol for Certificate Status Checking....Pages 395-409
A Comment on Group Independent Threshold Sharing....Pages 410-424
Automation-Considered Logic of Authentication and Key Distribution....Pages 425-441
The MESH Block Ciphers....Pages 442-457
Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves....Pages 458-473
Constructing and Cryptanalysis of a 16 ? 16 Binary Matrix as a Diffusion Layer....Pages 474-488
Back Matter....Pages 489-503
....Pages -
Download the book Information Security Applications: 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen