default search action
WISA 2004: Jeju Island, Korea
- Chae Hoon Lim, Moti Yung:
Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3325, Springer 2004, ISBN 3-540-24015-2
Network/Computer Security
- Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland:
Impacts of Security Protocols on Real-Time Multimedia Communications. 1-13 - Young Jae Choi, Soon-Ja Kim:
An Improvement on Privacy and Authentication in GSM. 14-26 - Markku-Juhani Olavi Saarinen:
Encrypted Watermarks and Linux Laptop Security. 27-38 - Chang-Joo Moon, Hoh Peter In:
Inconsistency Detection of Authorization Policies in Distributed Component Environment. 39-50
Public Key Schemes I
- Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Custodian-Hiding Verifiable Encryption. 51-64 - Malek Bechlaghem, Vincent Rijmen:
Proving Key Usage. 65-72 - Dong Jin Park, Kihyun Kim, Pil Joong Lee:
Public Key Encryption with Conjunctive Field Keyword Search. 73-86
Intrusion Detection I
- Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai:
A Probabilistic Method for Detecting Anomalous Program Behavior. 87-98 - Fernando Godínez, Dieter Hutter, Raúl Monroy:
Service Discrimination and Audit File Reduction for Effective Intrusion Detection. 99-113 - Kwok Ho Law, Lam For Kwok:
IDS False Alarm Filtering Using KNN Classifier. 114-121
Watermarking/Anti-spamming
- Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, Young-Ho Suh:
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking. 122-134 - Manabu Iwanaga, Toshihiro Tabata, Kouichi Sakurai:
Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment. 135-143
Public Key Schemes II
- Kui Ren, Hyunrok Lee, Kwangjo Kim, Taewhan Yoo:
Efficient Authenticated Key Agreement Protocol for Dynamic Groups. 144-159 - Jing Xu, Zhenfeng Zhang, Dengguo Feng:
A Ring Signature Scheme Using Bilinear Pairings. 160-169 - Sherman S. M. Chow:
Verifiable Pairing and Its Applications. 170-187
Intrusion Detection II
- Bart Haagdorens, Tim Vermeiren, Marnix Goossens:
Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading. 188-203 - Seok Bong Jeong, Young-Woo Choi, Sehun Kim:
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks. 204-210 - Yi-Yuan Huang, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun:
Application of Content Computing in Honeyfarm. 211-222
Digital Rights Management
- Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin:
License Protection with a Tamper-Resistant Token. 223-237 - Yinyan Yu, Zhi Tang:
An Adaptive Approach to Hardware Alteration for Digital Rights Management. 238-250 - Mira Kim, Kazukuni Kobara, Hideki Imai:
Dynamic Fingerprinting over Broadcast Using Revocation Scheme. 251-263 - Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee:
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels. 264-277
e-Commerce Security
- SangCheol Hwang, Dong Hoon Lee, Daewan Han, Jae-Cheol Ryou:
Vulnerability of a Mobile Payment System Proposed at WISA 2002. 278-285 - Sangjin Kim, Heekuck Oh:
Fair Offline Payment Using Verifiable Encryption. 286-301 - Supakorn Kungpisdan, Phu Dung Le, Bala Srinivasan:
A Limited-Used Key Generation Scheme for Internet Transactions. 302-316
Efficient Implementation
- Kishan Chand Gupta, Palash Sarkar:
Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes. 317-331 - Soonhak Kwon:
Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(qn) Using a Gaussian Normal Basis of Type II. 332-344 - Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi:
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. 345-359 - Howon Kim, Thomas J. Wollinger, YongJe Choi, Kyoil Chung, Christof Paar:
Hyperelliptic Curve Coprocessors on a FPGA. 360-374
Anonymous Communication
- Kenji Imamoto, Kouichi Sakurai:
Key-Exchange Protocol Using Pre-agreed Session-ID. 375-387 - Gang Yao, Dengguo Feng:
A New k-Anonymous Message Transmission Protocol. 388-399 - Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski:
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack. 400-410
Side-Channel Attacks
- HyungSo Yoo, ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, IlHwan Park:
Side Channel Cryptanalysis on SEED. 411-424 - Elena Trichina, Lesya M. Korkishko:
Secure and Efficient AES Software Implementation for Smart Cards. 425-439 - Christian Rechberger, Elisabeth Oswald:
Practical Template Attacks. 440-456 - Hidema Tanaka, Osamu Takizawa, Akihiro Yamamura:
Evaluation and Improvement of the Tempest Fonts. 457-469
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.