Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers

Front Cover
Springer Science & Business Media, 2007 - Business & Economics - 388 pages
The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27–29, 2007. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We were very pleased and honored to serve as the Program Committee Co-chairs of WISA 2007. The Program Committee received 95 papers from 20 countries, and accepted 27 papers for the full presentation track. The papers were selected after an extensive and careful refereeing process in which each paper was reviewed by at least three members of the Program Committee. In addition to the contributed papers, the workshop had three special talks. Moti Yung gave a tutorial talk, entitled “Somebody You Know: The Fourth Factor of Authentication.” Kihong Park and Nasir Memon gave invited talks, entitled “Reactive Zero-Day Attack Protection” and “Securing Biometric T- plates,” respectively. Many people deserve our gratitude for their generous contributions to the success of the workshop. We would like to thank all the people involved in the technical program and in organizing the workshop. We are very grateful to the ProgramCommitteemembersandtheexternalrefereesfortheir timeande?orts in reviewing the submissions and selecting the accepted papers. We also express our special thanks to the Organizing Committee members for their hard work in organizing the workshop.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Selected pages

Contents

Universal ηT Pairing Algorithm over Arbitrary Extension Degree
1
Security Models and Efficient Construction
16
How to Achieve Business Privacy Efficiently?
30
Implementation of BioAPI Conformance Test Suite Using BSP Testing Model
48
Information Hiding in Software with Mixed BooleanArithmetic Transforms
61
Geometrically Invariant Image Watermarking in the DWT Domain
76
Implementation of LSMBased RBAC Module for Embedded System
91
Iteration Bound Analysis and Throughput Optimum Architecture of SHA256 384512 for Hardware Implementations
102
Security Analysis of MISTY1
215
A Generic Method for Secure SBox Implementation
227
On the Security of a Popular Web Submission and Review Software WSaR for Cryptology Conferences
245
Authorization Constraints Specification of RBAC
266
Dynamic Access Control Research for Interoperation in Multidomain Environment Based on Risk
277
A Compositional Multiple Policies Operating System Security Model
291
Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones
303
Differential Power Analysis of HMAC Based on SHA2 and Countermeasures
317

A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor
115
Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine
128
An Architecture Providing VirtualizationBased Protection Mechanisms Against Insider Attacks
142
Detecting Motifs in System Call Sequences
157
Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement
173
Breaking 104 Bit WEP in Less Than 60 Seconds
188
Efficient Implementation of the Pairing on Mobilephones Using BREW
203
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC
333
Risk Distortion Based KAnonymity
345
Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System
359
An Incentive Compatible Reputation Mechanism for P2P Systems
371
Author Index
387
Copyright

Other editions - View all

Common terms and phrases