WISA 2006:
Jeju Island,
Korea
Jae-Kwang Lee, Okyeon Yi, Moti Yung (Eds.):
Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers.
Lecture Notes in Computer Science 4298 Springer 2007, ISBN 978-3-540-71092-9 BibTeX
Public Key Crypto Applications/Virus Protection
Cyber Indication/Intrusion Detection
Biometrics/Security Trust Management
- Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Okyeon Yi, Namil Lee, Kiyoung Moon:
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.
100-109
Electronic Edition (link) BibTeX
- Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park:
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification.
110-120
Electronic Edition (link) BibTeX
- Bo-Chao Cheng, Huan Chen:
Quality Assurance for Evidence Collection in Network Forensics.
121-132
Electronic Edition (link) BibTeX
Secure Software/Systems
Smart Cards/Secure Hardware
- HyungSo Yoo, Christoph Herbst, Stefan Mangard, Elisabeth Oswald, Sang-Jae Moon:
Investigations of Power Analysis Attacks and Countermeasures for ARIA.
160-172
Electronic Edition (link) BibTeX
- Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim:
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols.
173-186
Electronic Edition (link) BibTeX
- Chin-Chen Chang, Chia-Chi Wu:
A Novel Key Agreement Scheme in a Multiple Server Environment.
187-197
Electronic Edition (link) BibTeX
Mobile Security
DRM/Information Hiding/Ubiquitous Computing Security/P2P Security
- Harikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Jan Martin Surminen:
Distributed Management of OMA DRM Domains.
237-251
Electronic Edition (link) BibTeX
- Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa:
New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting.
252-266
Electronic Edition (link) BibTeX
- Mihui Kim, Inshil Doh, Kijoon Chae:
A Key Management Based on Multiple Regression in Hierarchical Sensor Network.
267-281
Electronic Edition (link) BibTeX
- Jabeom Gu, Jaehoon Nah, Cheoljoo Chae, Jaekwang Lee, Jongsoo Jang:
Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks.
282-296
Electronic Edition (link) BibTeX
Privacy/Anonymity
Internet and Wireless Security
Copyright © Sat May 16 23:48:04 2009
by Michael Ley (ley@uni-trier.de)