Coverart for item
The Resource Information security applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003 : revised papers, Kijoon Chae, Moti Yung (eds.)

Information security applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003 : revised papers, Kijoon Chae, Moti Yung (eds.)

Label
Information security applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003 : revised papers
Title
Information security applications
Title remainder
4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003 : revised papers
Statement of responsibility
Kijoon Chae, Moti Yung (eds.)
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Information Security Applications, WISA 2003, held on Jeju Island, Korea, in August 2003. The 36 revised full papers were carefully reviewed and selected from 200 submissions. The papers are organized in topical sections on network security, mobile security; intrusion detection; Internet security; secure software, hardware, and systems; e-commerce security; digital rights management; biometrics and human interfaces; public key cryptography and key management; and applied cryptography
Member of
Cataloging source
N$T
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
W577 2003eb
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2003
http://bibfra.me/vocab/lite/meetingName
WISA (Workshop : Information security)
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Chae, Kijoon
  • Yung, Moti
Series statement
Lecture notes in computer science,
Series volume
2908
http://library.link/vocab/subjectName
  • Computer security
  • Data protection
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Computer security
  • Data protection
  • Benutzeroberfläche
  • Biometrie
  • Datensicherung
  • Kongress
  • Kryptologie
  • Public-Key-Kryptosystem
  • Système informatique
  • Mesures de sécurité
  • Sécurité informatique
  • Biométrie
  • Sécurité des données
  • Mustererkennung
Label
Information security applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003 : revised papers, Kijoon Chae, Moti Yung (eds.)
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Network Security -- Model Checking of Security Protocols with Pre-configuration -- Remote Access VPN with Port Protection Function by Mobile Codes -- A Role of DEVS Simulation for Information Assurance -- Mobile Security -- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes -- Reliable Cascaded Delegation Scheme for Mobile Agent Environments -- Practical Solution for Location Privacy in Mobile IPv6 -- Intrusion Detection -- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection -- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System -- Towards a Global Security Architecture for Intrusion Detection and Reaction Management -- Internet Security -- Intrusion-Tolerant System Design for Web Server Survivability -- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access -- An Automatic Security Evaluation System for IPv6 Network -- Secure Software, Hardware, and Systems I -- A Location Privacy Protection Mechanism for Smart Space -- Secure System Architecture Based on Dynamic Resource Reallocation -- Fair Exchange with Guardian Angels -- Secure Software, Hardware, and Systems II -- Sign-Based Differential Power Analysis -- Asymmetric Watermarking Scheme Using Permutation Braids -- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m) -- E-commerce Security -- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction -- Multi-dimensional Hash Chain For Sealed-Bid Auction -- An Improved Forward Integrity Protocol for Mobile Agents -- Digital Rights Management -- Taming "Trusted Platforms" by Operating System Design -- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation -- Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes -- Biometrics and Human Interfaces I -- 3D Face Recognition under Pose Varying Environments -- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint -- Fingerprint-Based Authentication for USB Token Systems -- Biometrics and Human Interfaces II -- Iris Recognition System Using Wavelet Packet and Support Vector Machines -- Biometrics Identification and Verification Using Projection-Based Face Recognition System -- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification -- Public Key Cryptography / Key Management -- E-MHT. An Efficient Protocol for Certificate Status Checking -- A Comment on Group Independent Threshold Sharing -- Automation-Considered Logic of Authentication and Key Distribution -- Applied Cryptography -- The MESH Block Ciphers -- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves -- Constructing and Cryptanalysis of a 16 {u00D7} 16 Binary Matrix as a Diffusion Layer
Control code
60785474
Dimensions
unknown
Extent
1 online resource (xii, 506 pages)
File format
unknown
Form of item
online
Isbn
9781280306716
Lccn
2004040674
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/b95188
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)60785474
Label
Information security applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003 : revised papers, Kijoon Chae, Moti Yung (eds.)
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Network Security -- Model Checking of Security Protocols with Pre-configuration -- Remote Access VPN with Port Protection Function by Mobile Codes -- A Role of DEVS Simulation for Information Assurance -- Mobile Security -- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes -- Reliable Cascaded Delegation Scheme for Mobile Agent Environments -- Practical Solution for Location Privacy in Mobile IPv6 -- Intrusion Detection -- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection -- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System -- Towards a Global Security Architecture for Intrusion Detection and Reaction Management -- Internet Security -- Intrusion-Tolerant System Design for Web Server Survivability -- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access -- An Automatic Security Evaluation System for IPv6 Network -- Secure Software, Hardware, and Systems I -- A Location Privacy Protection Mechanism for Smart Space -- Secure System Architecture Based on Dynamic Resource Reallocation -- Fair Exchange with Guardian Angels -- Secure Software, Hardware, and Systems II -- Sign-Based Differential Power Analysis -- Asymmetric Watermarking Scheme Using Permutation Braids -- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m) -- E-commerce Security -- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction -- Multi-dimensional Hash Chain For Sealed-Bid Auction -- An Improved Forward Integrity Protocol for Mobile Agents -- Digital Rights Management -- Taming "Trusted Platforms" by Operating System Design -- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation -- Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes -- Biometrics and Human Interfaces I -- 3D Face Recognition under Pose Varying Environments -- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint -- Fingerprint-Based Authentication for USB Token Systems -- Biometrics and Human Interfaces II -- Iris Recognition System Using Wavelet Packet and Support Vector Machines -- Biometrics Identification and Verification Using Projection-Based Face Recognition System -- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification -- Public Key Cryptography / Key Management -- E-MHT. An Efficient Protocol for Certificate Status Checking -- A Comment on Group Independent Threshold Sharing -- Automation-Considered Logic of Authentication and Key Distribution -- Applied Cryptography -- The MESH Block Ciphers -- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves -- Constructing and Cryptanalysis of a 16 {u00D7} 16 Binary Matrix as a Diffusion Layer
Control code
60785474
Dimensions
unknown
Extent
1 online resource (xii, 506 pages)
File format
unknown
Form of item
online
Isbn
9781280306716
Lccn
2004040674
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/b95188
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)60785474

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
Processing Feedback ...