WISA 2005:
Jeju Island,
Korea
JooSeok Song, Taekyoung Kwon, Moti Yung (Eds.):
Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers.
Lecture Notes in Computer Science 3786 Springer 2006, ISBN 3-540-31012-6 BibTeX
Security Analysis and Attacks
System Security
Network Security
DRM/Software Security
- Fei Guo, Jianmin Wang, Zhihao Zhang, Xiaojun Ye, Deyi Li:
An Improved Algorithm to Watermark Numeric Relational Data.
138-149
Electronic Edition (link) BibTeX
- Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Hyejoo Lee, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi:
Video Fingerprinting System Using Wavelet and Error Correcting Code.
150-164
Electronic Edition (link) BibTeX
- Mitsuo Okada, Hiroaki Kikuchi:
Secure Asymmetric Watermark Detection Without Secret of Modified Pixels.
165-178
Electronic Edition (link) BibTeX
- Jin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim:
Kimchi: A Binary Rewriting Defense Against Format String Attacks.
179-193
Electronic Edition (link) BibTeX
- Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, Koen De Bosschere:
Software Protection Through Dynamic Code Mutation.
194-206
Electronic Edition (link) BibTeX
Efficient HW Implementation
- Mun-Kyu Lee, Keon Tae Kim, Howon Kim, Dong Kyue Kim:
Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm).
207-217
Electronic Edition (link) BibTeX
- Bo-Chao Cheng, Ching-Fu Huang, Wei-Chi Chang, Cheng-Shong Wu:
Developing and Implementing IHPM on IXP 425 Network Processor Platforms.
218-231
Electronic Edition (link) BibTeX
- Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama:
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices.
232-242
Electronic Edition (link) BibTeX
- Chae Hoon Lim, Tymur Korkishko:
mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors.
243-258
Electronic Edition (link) BibTeX
Side-Channel Attacks
Privacy/Anonymity
Efficient Implementation
Copyright © Sat May 16 23:48:03 2009
by Michael Ley (ley@uni-trier.de)