default search action
WISA 2003: Jeju Island, Korea
- Kijoon Chae, Moti Yung:
Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. Lecture Notes in Computer Science 2908, Springer 2004, ISBN 3-540-20827-5
Network Security
- Kyoil Kim, Jacob A. Abraham, Jayanta Bhadra:
Model Checking of Security Protocols with Pre-configuration. 1-15 - Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii:
Remote Access VPN with Port Protection Function by Mobile Codes. 16-26 - Sung-Do Chi, Jong Sou Park, Jang-Se Lee:
A Role of DEVS Simulation for Information Assurance. 27-41
Mobile Security
- Kwok-Yan Lam, Xibin Zhao, Siu Leung Chung, Ming Gu, Jia-Guang Sun:
Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. 42-54 - Hyun Suk Lee, Hyeog Man Kwon, Young Ik Eom:
Reliable Cascaded Delegation Scheme for Mobile Agent Environments. 55-68 - SuGil Choi, Kwangjo Kim, ByeongGon Kim:
Practical Solution for Location Privacy in Mobile IPv6. 69-83
Intrusion Detection
- Jin Suk Kim, Hohn Gyu Lee, Sungbo Seo, Keun Ho Ryu:
CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection. 84-96 - Ja-Min Koo, Sung-Bae Cho:
Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System. 97-110 - Renaud Bidou, Julien Bourgeois, François Spies:
Towards a Global Security Architecture for Intrusion Detection and Reaction Management. 111-123
Internet Security
- Dae-Sik Choi, Eul-Gyu Im, Cheol Won Lee:
Intrusion-Tolerant System Design for Web Server Survivability. 124-134 - Paulo S. Pagliusi, Chris J. Mitchell:
PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. 135-149 - Jaehoon Nah, Hyeokchan Kwon, Sungwon Sohn, Cheehang Park, ChiMoon Han:
An Automatic Security Evaluation System for IPv6 Network. 150-161
Secure Software, Hardware, and Systems I
- Yeongsub Cho, Sangrae Cho, Daeseon Choi, Seunghun Jin, Kyoil Chung, Cheehang Park:
A Location Privacy Protection Mechanism for Smart Space. 162-173 - Byoung-Joon Min, Sung Ki Kim, Joong-Sup Choi:
Secure System Architecture Based on Dynamic Resource Reallocation. 174-187 - Gildas Avoine, Serge Vaudenay:
Optimal Fair Exchange with Guardian Angels. 188-202
Secure Software, Hardware, and Systems II
- Roman Novak:
Sign-Based Differential Power Analysis. 203-216 - Geun-Sil Song, Mi-Ae Kim, Won-Hyung Lee:
Asymmetric Watermarking Scheme Using Permutation Braids. 217-226 - Johann Großschädl, Guy-Armand Kamendje:
Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2m). 227-243
E-commerce Security
- Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan:
Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. 244-256 - Navapot Prakobpol, Yongyuth Permpoontanalarp:
Multi-dimensional Hash Chain For Sealed-Bid Auction. 257-271 - Ming Yao, Ernest Foo, Kun Peng, Ed Dawson:
An Improved Forward Integrity Protocol for Mobile Agents. 272-285
Digital Rights Management
- Ahmad-Reza Sadeghi, Christian Stüble:
Taming "Trusted Platforms" by Operating System Design. 286-302 - Kazuhide Fukushima, Kouichi Sakurai:
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation. 303-316 - Tomoyuki Asano:
Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes. 317-332
Biometrics and Human Interfaces I
- Hwanjong Song, Ukil Yang, Kwanghoon Sohn:
3D Face Recognition under Pose Varying Environments. 333-347 - Hyosup Kang, Y. Han, Hakil Kim, W. Choi, Yongwha Chung:
An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint. 348-354 - Daesung Moon, Youn-Hee Gil, Dosung Ahn, Sung Bum Pan, Yongwha Chung, Chee-Hang Park:
Fingerprint-Based Authentication for USB Token Systems. 355-364
Biometrics and Human Interfaces II
- Byungjun Son, Gyundo Kee, Yillbyung Lee:
Iris Recognition System Using Wavelet Packet and Support Vector Machines. 365-379 - Hyeonjoon Moon, Jaihie Kim:
Biometrics Identification and Verification Using Projection-Based Face Recognition System. 380-394 - Suyoung Chi, Jaeyeon Lee, Jung Soh, Do-Hyung Kim, Weon-Geun Oh, Changhun Kim:
Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification. 395-409
Public Key Cryptography / Key Management
- Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano:
E-MHT. An Efficient Protocol for Certificate Status Checking. 410-424 - Brian King:
A Comment on Group Independent Threshold Sharing. 425-441 - Taekyoung Kwon, Seongan Lim:
Automation-Considered Logic of Authentication and Key Distribution. 442-457
Applied Cryptography
- Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle:
The MESH Block Ciphers. 458-473 - Dong Jin Park, Sang Gyoo Sim, Pil Joong Lee:
Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves. 474-488 - Bonwook Koo, Hwan Seok Jang, Jung Hwan Song:
Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer. 489-503
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.