Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers

Overview

Complete with Springer’s trademark online files and updates, this fascinating text constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, in August 2007. The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on a wide range of subjects from secure systems to P2P ...

See more details below
Paperback (2007)
$97.30
BN.com price
(Save 18%)$119.00 List Price
Other sellers (Paperback)
  • All (8) from $45.00   
  • New (5) from $62.23   
  • Used (3) from $45.0   
Sending request ...

Overview

Complete with Springer’s trademark online files and updates, this fascinating text constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, in August 2007. The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on a wide range of subjects from secure systems to P2P security.

Read More Show Less

Product Details

Table of Contents

Public Key Crypto Applications

Universal [eta][subscript T] Pairing Algorithm over Arbitrary Extension Degree Masaaki Shirase Shirase, Masaaki Yuto Kawahara Kawahara, Yuto Tsuyoshi Takagi Takagi, Tsuyoshi Eiji Okamoto Okamoto, Eiji 1

Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction Wei Wu Wei, Wu Yi Mu Yi, Mu Willy Susilo Susilo, Willy Xinyi Huang Huang, Xinyi 16

Secret Signatures: How to Achieve Business Privacy Efficiently? Byoungcheon Lee Lee, Byoungcheon Kim-Kwang Raymond Choo Choo, Kim-Kwang Raymond Jeongmo Yang Yang, Jeongmo Seungjae Yoo Yoo, Seungjae 30

Biometrics/Information Hiding

Implementation of BioAPI Conformance Test Suite Using BSP Testing Model Jihyeon Jang Jang, Jihyeon Stephen J. Elliott Elliott, Stephen J. Hakil Kim Kim, Hakil 48

Information Hiding in Software with Mixed Boolean-Arithmetic Transforms Yongxin Zhou Zhou, Yongxin Alec Main Main, Alec Yuan X. Gu Yuan, X. Gu Harold Johnson Johnson, Harold 61

Geometrically Invariant Image Watermarking in the DWT Domain Shijun Xiang Xiang, Shijun Hyoung-Joong Kim Kim, Hyoung-Joong 76

Secure Hardware

Implementation of LSM-Based RBAC Module for Embedded System Jae-Deok Lim Lim, Jae-Deok Sung-Kyong Un Un, Sung-Kyong Jeong-Nyeo Kim Kim, Jeong-Nyeo ChoelHoon Lee Lee, ChoelHoon 91

Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations Yong Ki Lee Yong, Ki Lee Herwin Chan Chan, Herwin Ingrid Verbauwhede Verbauwhede, Ingrid 102

A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor Yong Ki Lee Yong, Ki Lee Ingrid Verbauwhede Verbauwhede, Ingrid 115

Secure Systems

Windows Vault:Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine Yoshiki Sameshima Sameshima, Yoshiki Hideaki Saisho Saisho, Hideaki Tsutomu Matsumoto Matsumoto, Tsutomu Norihisa Komoda Komoda, Norihisa 128

An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks Frederic Stumpf Stumpf, Frederic Patrick Roder Roder, Patrick Claudia Eckert Eckert, Claudia 142

Detecting Motifs in System Call Sequences William O. Wilson Wilson, William O. Jan Feyereisl Feyereisl, Jan Uwe Aickelin Aickelin, Uwe 157

Wireless and Mobile Security

Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System Toru Hashimoto Hashimoto, Toru Takashi Itoh Itoh, Takashi Masazumi Ueba Ueba, Masazumi Hisato Iwai Iwai, Hisato Hideichi Sasaoka Sasaoka, Hideichi Kazukuni Kobara Kobara, Kazukuni Hideki Imai Imai, Hideki 173

Breaking 104 Bit WEP in Less Than 60 Seconds Erik Tews Tews, Erik Ralf-Philipp Weinmann Weinmann, Ralf-Philipp Andrei Pyshkin Pyshkin, Andrei 188

Efficient Implementation of the Pairing on Mobilephones Using BREW Motoi Yoshitomi Yoshitomi, Motoi Tsuyoshi Takagi Takagi, Tsuyoshi Shinsaku Kiyomoto Kiyomoto, Shinsaku Toshiaki Tanaka Tanaka, Toshiaki 203

Application Security/Secure Systems

Security Analysis of MISTY1 Hidema Tanaka Tanaka, Hidema Yasuo Hatano Hatano, Yasuo Nobuyuki Sugio Sugio, Nobuyuki Toshinobu Kaneko Kaneko, Toshinobu 215

A Generic Method for Secure SBox Implementation Emmanuel Prouff Prouff, Emmanuel Matthieu Rivain Rivain, Matthieu 227

On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences Swee-Won Lo Lo, Swee-Won Raphael C.-W. Phan Phan, Raphael C.-W. Bok-Min Got Got, Bok-Min 245

Access Control/DB Security

Authorization Constraints Specification of RBAC Lilong Han Han, Lilong Qingtan Liu Liu, Qingtan Zongkai Yang Yang, Zongkai 266

Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk Zhuo Tang Zhuo, Tang Ruixuan Li Li, Ruixuan Zhengding Lu Lu, Zhengding Zhumu Wen Wen, Zhumu 277

A Compositional Multiple Policies Operating System Security Model Lei Xia Lei, Xia Wei Huang Wei, Huang Hao Huang Hao, Huang 291

Smart Cards/Secure Systems

Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones Colin D. Walter Walter, Colin D. 303

Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures Robert McEvoy McEvoy, Robert Michael Tunstall Tunstall, Michael Colin C. Murphy Murphy, Colin C. William P. Marnane Marnane, William P. 317

Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC JaeCheol Ha Ha, JaeCheol JeaHoon Park Park, JeaHoon SangJae Moon Moon, SangJae SungMing Yen Yen, SungMing 333

Anonymity and P2P Security

Risk & Distortion Based K-Anonymity Shenkun Xu Xu, Shenkun Xiaojun Ye Ye, Xiaojun 345

Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System Myeonggil Choi Choi, Myeonggil Sangmun Shin Shin, Sangmun 359

ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems Junsheng Chang Chang, Junsheng Huaimin Wang Wang, Huaimin Gang Yin Gang, Yin Yangbin Tang Tang, Yangbin 371

Author Index 387

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)