default search action
WISA 2005: Jeju Island, Korea
- JooSeok Song, Taekyoung Kwon, Moti Yung:
Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3786, Springer 2006, ISBN 3-540-31012-6
Security Analysis and Attacks
- Junghyun Nam, Seungjoo Kim, Dongho Won:
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. 1-9 - Je Hong Park, Bo Gyeong Kang, Sangwoo Park:
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes. 10-24 - Sourav Mukhopadhyay, Palash Sarkar:
Application of LFSRs in Time/Memory Trade-Off Cryptanalysis. 25-37
System Security
- Moon Sun Shin, Kyeong Ja Jeong:
An Alert Data Mining Framework for Network-Based Intrusion Detection System. 38-53 - Urupoj Kanlayasiri, Surasak Sanguanpong:
Key Factors Influencing Worm Infection in Enterprise Networks. 54-67 - Marife G. Ontua, Susan Pancho-Festin:
Evaluation of the Unified Modeling Language for Security Requirements Analysis. 68-80
Network Security
- Wen-Shenq Juang:
A Simple and Efficient Conference Scheme for Mobile Communications. 81-95 - Kihun Hong, Souhwan Jung, Shyhtsun Felix Wu:
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. 96-107 - Christophe Tartary, Huaxiong Wang:
Efficient Multicast Stream Authentication for the Fully Adversarial Network Model. 108-125 - Minsoo Lee, Sehyun Park, Ohyoung Song:
Elastic Security QoS Provisioning for Telematics Applications. 126-137
DRM/Software Security
- Fei Guo, Jianmin Wang, Zhihao Zhang, Xiaojun Ye, Deyi Li:
An Improved Algorithm to Watermark Numeric Relational Data. 138-149 - Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Hyejoo Lee, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi:
Video Fingerprinting System Using Wavelet and Error Correcting Code. 150-164 - Mitsuo Okada, Hiroaki Kikuchi:
Secure Asymmetric Watermark Detection Without Secret of Modified Pixels. 165-178 - Jin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim:
Kimchi: A Binary Rewriting Defense Against Format String Attacks. 179-193 - Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, Koen De Bosschere:
Software Protection Through Dynamic Code Mutation. 194-206
Efficient HW Implementation
- Mun-Kyu Lee, Keon Tae Kim, Howon Kim, Dong Kyue Kim:
Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm). 207-217 - Bo-Chao Cheng, Ching-Fu Huang, Wei-Chi Chang, Cheng-Shong Wu:
Developing and Implementing IHPM on IXP 425 Network Processor Platforms. 218-231 - Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama:
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices. 232-242 - Chae Hoon Lim, Tymur A. Korkishko:
mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors. 243-258
Side-Channel Attacks
- Katsuyuki Takashima:
Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA. 259-270 - Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung:
A DPA Countermeasure by Randomized Frobenius Decomposition. 271-282 - Jong Hoon Shin, Dong Jin Park, Pil Joong Lee:
DPA Attack on the Improved Ha-Moon Algorithm. 283-291 - Elisabeth Oswald, Kai Schramm:
An Efficient Masking Scheme for AES Software Implementations. 292-305
Privacy/Anonymity
- Koutarou Suzuki, Makoto Yokoo:
Secure Multi-attribute Procurement Auction. 306-317 - Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Oblivious Conjunctive Keyword Search. 318-327 - Go Yamamoto, Koji Chida, Anderson C. A. Nascimento, Koutarou Suzuki, Shigenori Uchiyama:
Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption. 328-342
Efficient Implementation
- Sejong Oh:
New Concept of Authority Range for Flexible Management of Role Hierarchy. 343-353 - Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim:
Role-Based Access Control Model for Ubiquitous Computing Environment. 354-363 - Ho Lee, Jung Hwan Song:
Designing Security Auditing Protocol with Web Browsers. 364-376
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.