Coverart for item
The Resource Information security applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised selected papers, Kyo-Il Chung, Kiwook Sohn, Moti Yung (Eds.)

Information security applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised selected papers, Kyo-Il Chung, Kiwook Sohn, Moti Yung (Eds.)

Label
Information security applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised selected papers
Title
Information security applications
Title remainder
9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised selected papers
Statement of responsibility
Kyo-Il Chung, Kiwook Sohn, Moti Yung (Eds.)
Title variation
WISA 2008
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008. The 24 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on smart card and secure hardware, wireless and sensor network security, public key crypto applications, privacy and anonymity, n/w security and intrusion detection, as well as application security and trust management
Member of
Cataloging source
GW5XE
Dewey number
005.8
Index
index present
LC call number
QA76.9.A25
LC item number
W577 2008
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2008
http://bibfra.me/vocab/lite/meetingName
WISA (Workshop : Information security)
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Chung, Kyo-Il
  • Sohn, Kiwook
  • Yung, Moti
Series statement
Lecture notes in computer science
Series volume
5379
http://library.link/vocab/subjectName
  • Computer security
  • Data encryption (Computer science)
  • Data protection
  • Informatique
  • Computer security
  • Data encryption (Computer science)
  • Data protection
  • Chipkarte
  • Computersicherheit
  • Datensicherung
  • Drahtloses Sensorsystem
  • Kryptoanalyse
  • Kryptosystem
  • Trusted Computing
Label
Information security applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised selected papers, Kyo-Il Chung, Kiwook Sohn, Moti Yung (Eds.)
Instantiates
Publication
Note
  • International conference proceedings
  • Includes index
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Smart Card and Secure Hardware(1) -- Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation -- Template Attacks on ECDSA -- Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool -- Wireless and Sensor Network Security(1) -- Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network -- Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol -- Securing Layer-2 Path Selection in Wireless Mesh Networks -- Public Key Crypto Applications -- Public Key Authentication with Memory Tokens -- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures -- Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme -- Privacy and Anonymity -- Sanitizable and Deletable Signature -- An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data -- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition -- N/W Security and Intrusion Detection -- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512 -- A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model -- A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence -- Application Security and Trust Management -- Image-Feature Based Human Identification Protocols on Limited Display Devices -- Ternary Subset Difference Method and Its Quantitative Analysis -- Data Deletion with Provable Security -- Smart Card and Secure Hardware(2) -- A Probing Attack on AES -- On Avoiding ZVP-Attacks Using Isogeny Volcanoes -- Security Analysis of DRBG Using HMAC in NIST SP 800-90 -- Wireless and Sensor Network Security(2) -- Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module -- An Improved Distributed Key Management Scheme in Wireless Sensor Networks -- Protection Profile for Connected Interoperable DRM Framework
Control code
318545530
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9783642003066
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 10.1007/978-3-642-00306-6
  • 9786612018190
http://library.link/vocab/ext/overdrive/overdriveId
978-3-642-00305-9
Specific material designation
remote
System control number
(OCoLC)318545530
Label
Information security applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised selected papers, Kyo-Il Chung, Kiwook Sohn, Moti Yung (Eds.)
Publication
Note
  • International conference proceedings
  • Includes index
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Smart Card and Secure Hardware(1) -- Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation -- Template Attacks on ECDSA -- Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool -- Wireless and Sensor Network Security(1) -- Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network -- Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol -- Securing Layer-2 Path Selection in Wireless Mesh Networks -- Public Key Crypto Applications -- Public Key Authentication with Memory Tokens -- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures -- Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme -- Privacy and Anonymity -- Sanitizable and Deletable Signature -- An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data -- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition -- N/W Security and Intrusion Detection -- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512 -- A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model -- A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence -- Application Security and Trust Management -- Image-Feature Based Human Identification Protocols on Limited Display Devices -- Ternary Subset Difference Method and Its Quantitative Analysis -- Data Deletion with Provable Security -- Smart Card and Secure Hardware(2) -- A Probing Attack on AES -- On Avoiding ZVP-Attacks Using Isogeny Volcanoes -- Security Analysis of DRBG Using HMAC in NIST SP 800-90 -- Wireless and Sensor Network Security(2) -- Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module -- An Improved Distributed Key Management Scheme in Wireless Sensor Networks -- Protection Profile for Connected Interoperable DRM Framework
Control code
318545530
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9783642003066
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 10.1007/978-3-642-00306-6
  • 9786612018190
http://library.link/vocab/ext/overdrive/overdriveId
978-3-642-00305-9
Specific material designation
remote
System control number
(OCoLC)318545530

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...