WISA 2008:
Jeju Island,
Korea
Kyo-Il Chung, Kiwook Sohn, Moti Yung (Eds.):
Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers.
Lecture Notes in Computer Science 5379 Springer 2009, ISBN 978-3-642-00305-9 BibTeX
Smart Card and Secure Hardware(1)
Wireless and Sensor Network Security(1)
Public Key Crypto Applications
- Camille Vuillaume, Katsuyuki Okeya, Erik Dahmen, Johannes Buchmann:
Public Key Authentication with Memory Tokens.
84-98
Electronic Edition (link) BibTeX
- Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.
99-114
Electronic Edition (link) BibTeX
- S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan:
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.
115-129
Electronic Edition (link) BibTeX
Privacy and Anonymity
- Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka:
Sanitizable and Deletable Signature.
130-144
Electronic Edition (link) BibTeX
- Peishun Wang, Huaxiong Wang, Josef Pieprzyk:
An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data.
145-159
Electronic Edition (link) BibTeX
- Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta:
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.
160-173
Electronic Edition (link) BibTeX
N/W Security and Intrusion Detection
Application Security and Trust Management
- Hassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Yuan Wei Wei, Syed Muhammad Khaliq-ur-rehman Raazi, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes:
Image-Feature Based Human Identification Protocols on Limited Display Devices.
211-224
Electronic Edition (link) BibTeX
- Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Ternary Subset Difference Method and Its Quantitative Analysis.
225-239
Electronic Edition (link) BibTeX
- Marek Klonowski, Michal Przykucki, Tomasz Struminski:
Data Deletion with Provable Security.
240-255
Electronic Edition (link) BibTeX
Smart Card and Secure Hardware(2)
Wireless and Sensor Network Security(2)
Copyright © Sat May 16 23:48:04 2009
by Michael Ley (ley@uni-trier.de)