default search action
WISA 2007: Jeju Island, Korea
- Sehun Kim, Moti Yung, Hyung-Woo Lee:
Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4867, Springer 2008, ISBN 978-3-540-77534-8
Public Key Crypto Applications
- Masaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto:
Universal etaT Pairing Algorithm over Arbitrary Extension Degree. 1-15 - Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. 16-29 - Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo:
Secret Signatures: How to Achieve Business Privacy Efficiently? 30-47
Biometrics/Information Hiding
- Jihyeon Jang, Stephen J. Elliott, Hakil Kim:
Implementation of BioAPI Conformance Test Suite Using BSP Testing Model. 48-60 - Yongxin Zhou, Alec Main, Yuan Xiang Gu, Harold Johnson:
Information Hiding in Software with Mixed Boolean-Arithmetic Transforms. 61-75 - Shijun Xiang, Hyoung-Joong Kim:
Geometrically Invariant Image Watermarking in the DWT Domain. 76-90
Secure Hardware
- Jae-Deok Lim, Sung-Kyong Un, Jeong-Nyeo Kim, ChoelHoon Lee:
Implementation of LSM-Based RBAC Module for Embedded System. 91-101 - Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede:
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations. 102-114 - Yong Ki Lee, Ingrid Verbauwhede:
A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor. 115-127
Secure Systems
- Yoshiki Sameshima, Hideaki Saisho, Tsutomu Matsumoto, Norihisa Komoda:
Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine. 128-141 - Frederic Stumpf, Patrick Röder, Claudia Eckert:
An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks. 142-156 - William O. Wilson, Jan Feyereisl, Uwe Aickelin:
Detecting Motifs in System Call Sequences. 157-172
Wireless and Mobile Security
- Toru Hashimoto, Takashi Itoh, Masazumi Ueba, Hisato Iwai, Hideichi Sasaoka, Kazukuni Kobara, Hideki Imai:
Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System. 173-187 - Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin:
Breaking 104 Bit WEP in Less Than 60 Seconds. 188-202 - Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW. 203-214
Application Security/Secure Systems
- Hidema Tanaka, Yasuo Hatano, Nobuyuki Sugio, Toshinobu Kaneko:
Security Analysis of MISTY1. 215-226 - Emmanuel Prouff, Matthieu Rivain:
A Generic Method for Secure SBox Implementation. 227-244 - Swee-Won Lo, Raphael C.-W. Phan, Bok-Min Goi:
On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences. 245-265
Access Control/DB Security
- Lilong Han, Qingtang Liu, Zongkai Yang:
Authorization Constraints Specification of RBAC. 266-276 - Zhuo Tang, Ruixuan Li, Zhengding Lu, Zhumu Wen:
Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk. 277-290 - Lei Xia, Wei Huang, Hao Huang:
A Compositional Multiple Policies Operating System Security Model. 291-302
Smart Cards/Secure Systems
- Colin D. Walter:
Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones. 303-316 - Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane:
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. 317-332 - JaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen:
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. 333-344
Anonymity and P2P Security
- Shenkun Xu, Xiaojun Ye:
Risk & Distortion Based K-Anonymity. 345-358 - Myeonggil Choi, Sangmun Shin:
Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System. 359-370 - Junsheng Chang, Huaimin Wang, Gang Yin, Yang-Bin Tang:
ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems. 371-386
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.