


default search action
WISA 2003: Jeju Island, Korea
- Kijoon Chae, Moti Yung:

Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. Lecture Notes in Computer Science 2908, Springer 2004, ISBN 3-540-20827-5
Network Security
- Kyoil Kim, Jacob A. Abraham, Jayanta Bhadra:

Model Checking of Security Protocols with Pre-configuration. 1-15 - Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii:

Remote Access VPN with Port Protection Function by Mobile Codes. 16-26 - Sung-Do Chi, Jong Sou Park, Jang-Se Lee:

A Role of DEVS Simulation for Information Assurance. 27-41
Mobile Security
- Kwok-Yan Lam, Xibin Zhao, Siu Leung Chung, Ming Gu, Jia-Guang Sun:

Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. 42-54 - Hyun Suk Lee, Hyeog Man Kwon, Young Ik Eom:

Reliable Cascaded Delegation Scheme for Mobile Agent Environments. 55-68 - SuGil Choi, Kwangjo Kim, ByeongGon Kim:

Practical Solution for Location Privacy in Mobile IPv6. 69-83
Intrusion Detection
- Jin Suk Kim, Hohn Gyu Lee, Sungbo Seo, Keun Ho Ryu:

CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection. 84-96 - Ja-Min Koo, Sung-Bae Cho:

Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System. 97-110 - Renaud Bidou, Julien Bourgeois, François Spies

:
Towards a Global Security Architecture for Intrusion Detection and Reaction Management. 111-123
Internet Security
- Dae-Sik Choi, Eul-Gyu Im, Cheol Won Lee:

Intrusion-Tolerant System Design for Web Server Survivability. 124-134 - Paulo S. Pagliusi, Chris J. Mitchell

:
PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. 135-149 - Jaehoon Nah, Hyeokchan Kwon, Sungwon Sohn, Cheehang Park, ChiMoon Han:

An Automatic Security Evaluation System for IPv6 Network. 150-161
Secure Software, Hardware, and Systems I
- Yeongsub Cho, Sangrae Cho, Daeseon Choi, Seunghun Jin, Kyoil Chung, Cheehang Park:

A Location Privacy Protection Mechanism for Smart Space. 162-173 - Byoung-Joon Min, Sung Ki Kim, Joong-Sup Choi:

Secure System Architecture Based on Dynamic Resource Reallocation. 174-187 - Gildas Avoine, Serge Vaudenay:

Optimal Fair Exchange with Guardian Angels. 188-202
Secure Software, Hardware, and Systems II
- Roman Novak

:
Sign-Based Differential Power Analysis. 203-216 - Geun-Sil Song, Mi-Ae Kim, Won-Hyung Lee:

Asymmetric Watermarking Scheme Using Permutation Braids. 217-226 - Johann Großschädl, Guy-Armand Kamendje:

Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2m). 227-243
E-commerce Security
- Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan:

Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. 244-256 - Navapot Prakobpol, Yongyuth Permpoontanalarp:

Multi-dimensional Hash Chain For Sealed-Bid Auction. 257-271 - Ming Yao, Ernest Foo, Kun Peng, Ed Dawson:

An Improved Forward Integrity Protocol for Mobile Agents. 272-285
Digital Rights Management
- Ahmad-Reza Sadeghi, Christian Stüble:

Taming "Trusted Platforms" by Operating System Design. 286-302 - Kazuhide Fukushima

, Kouichi Sakurai:
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation. 303-316 - Tomoyuki Asano:

Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes. 317-332
Biometrics and Human Interfaces I
- Hwanjong Song, Ukil Yang, Kwanghoon Sohn:

3D Face Recognition under Pose Varying Environments. 333-347 - Hyosup Kang, Y. Han, Hakil Kim, W. Choi, Yongwha Chung:

An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint. 348-354 - Daesung Moon, Youn-Hee Gil, Dosung Ahn, Sung Bum Pan, Yongwha Chung, Chee-Hang Park:

Fingerprint-Based Authentication for USB Token Systems. 355-364
Biometrics and Human Interfaces II
- Byungjun Son, Gyundo Kee, Yillbyung Lee:

Iris Recognition System Using Wavelet Packet and Support Vector Machines. 365-379 - Hyeonjoon Moon, Jaihie Kim:

Biometrics Identification and Verification Using Projection-Based Face Recognition System. 380-394 - Suyoung Chi, Jaeyeon Lee, Jung Soh, Do-Hyung Kim, Weon-Geun Oh, Changhun Kim:

Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification. 395-409
Public Key Cryptography / Key Management
- Jose L. Muñoz, Jordi Forné

, Oscar Esparza
, Miguel Soriano:
E-MHT. An Efficient Protocol for Certificate Status Checking. 410-424 - Brian King:

A Comment on Group Independent Threshold Sharing. 425-441 - Taekyoung Kwon, Seongan Lim:

Automation-Considered Logic of Authentication and Key Distribution. 442-457
Applied Cryptography
- Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle:

The MESH Block Ciphers. 458-473 - Dong Jin Park, Sang Gyoo Sim, Pil Joong Lee:

Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves. 474-488 - Bonwook Koo, Hwan Seok Jang, Jung Hwan Song:

Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer. 489-503

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














