Information Security Applications: 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers

Front Cover
Springer Science & Business Media, Jan 15, 2004 - Business & Economics - 506 pages
The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and TelecommunicationsResearchInstitute(ETRI),andtheMinistryofInformation and Communication (MIC). The workshop was held in Jeju Island, Korea - ring August 25–27, 2003. This international workshop provided ample technical sessions covering a large spectrum of information security applications. Subjects covered included network/mobile security, electronic commerce security, digital rights management, intrusion detection, secure systems and applications, bio- trics and human interfaces, public key cryptography, and applied cryptography. The program committee received 200 papers from 23 countries (representing most geographic areas where security and applied cryptography research is c- ductedthroughouttheworld).Eachsubmittedpaperwaspeer-reviewedbythree program committee members. This year, we had two tracks: long and short p- sentation tracks. We selected 36 papers for the long presentation track and 34 papers for the short presentation tracks. This volume contains revised versions of papers accepted for the long presentation track. We would like to note that getting accepted to both tracks was an achievement to be proud of, given the competitive nature of WISA this year. Papers in the short presentation track were only published in the WISA preproceedings as preliminary notes; ext- dedversionsofthesenotesmaybepublishedbyfutureconferencesorworkshops.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Model Checking of Security Protocols with Preconfiguration
1
Remote Access VPN with Port Protection Function by Mobile Codes
16
A Role of DEVS Simulation for Information Assurance
27
Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes
42
Environments
55
Practical Solution for Location Privacy in Mobile IPv6
69
Classification Based on temporal Class Association Rules for Intrusion Detection
84
Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System
97
Multidimensional Hash Chain for SealedBid Auction
257
An Improved Forward Integrity Protocol for Mobile Agents
272
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscationraion
303
Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes
317
3D Face Recognition under Pose Varying Environments
333
An Empirical Study of Multimode Biometric Systems Using Face and Fingerprint
348
FingerprintBased Authentication for USB Token Systems
355
Iris Recognition System Using Wavelet Packet and Support Vector Machines
365

Towards a Global Security Architecture for Intrusion Detection and Reaction Management
111
IntrusionTolerant System Design for Web Server Survivability
124
An Internet Authentication Protocol for Heterogeneous Access
135
An Automatic Security Evaluation System for IPv6 Network
150
A Location Privacy Protection Mechanism for Smart space
162
Secure System Architecture Based on Dynamic Resource Reallocation
174
Fair Exchange with Guardian Angels
188
SignBased Differential Power Analysis
203
Asymmetric Watermarking Scheme Using Permutation Braids
217
LowPower Design of a Functional Unit for Arithmetic in Finite Fields GFp and GF2m
227
Efficient Implementation of Relative Bid Privacy in SealedBid Auction
244
Biometrics Identification and Verification Using ProjectionBased Face Recognition System
380
An Application to Online Signature Verification
395
EMHT An Efficient Protocol for Certificate Status Checking
410
A Comment on Group Independent Threshold Sharing
425
AutomationConsidered Logic of Authentication and Key Distribution
442
The MESH Block Ciphers
458
Fast Scalar Multiplication Method Using ChangeofBasis Matrix to Prevent Power Analysis Attacks on Koblitz Curves
474
Constructing and Cryptanalysis of a 16 16 Binary Matrix as a Diffusion Layer
489
Author Index
504
Copyright

Other editions - View all

Common terms and phrases