Limit search to available items
Book Cover
E-book
Author WISA (Workshop : Information security) (9th : 2008 : Cheju-do, Korea)

Title Information security applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised selected papers / Kyo-Il Chung, Kiwook Sohn, Moti Yung (Eds.)
Published Heidelberg : Springer, ©2009

Copies

Description 1 online resource
Series Lecture notes in computer science ; 5379
Lecture notes in computer science ; 5379.
Contents Smart Card and Secure Hardware(1) -- Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation -- Template Attacks on ECDSA -- Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool -- Wireless and Sensor Network Security(1) -- Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network -- Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol -- Securing Layer-2 Path Selection in Wireless Mesh Networks -- Public Key Crypto Applications -- Public Key Authentication with Memory Tokens -- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures -- Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme -- Privacy and Anonymity -- Sanitizable and Deletable Signature -- An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data -- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition -- N/W Security and Intrusion Detection -- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512 -- A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model -- A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence -- Application Security and Trust Management -- Image-Feature Based Human Identification Protocols on Limited Display Devices -- Ternary Subset Difference Method and Its Quantitative Analysis -- Data Deletion with Provable Security -- Smart Card and Secure Hardware(2) -- A Probing Attack on AES -- On Avoiding ZVP-Attacks Using Isogeny Volcanoes -- Security Analysis of DRBG Using HMAC in NIST SP 800-90 -- Wireless and Sensor Network Security(2) -- Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module -- An Improved Distributed Key Management Scheme in Wireless Sensor Networks -- Protection Profile for Connected Interoperable DRM Framework
Summary This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008. The 24 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on smart card and secure hardware, wireless and sensor network security, public key crypto applications, privacy and anonymity, n/w security and intrusion detection, as well as application security and trust management
Notes International conference proceedings
Includes index
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Data protection -- Congresses
Informatique.
Computer security
Data encryption (Computer science)
Data protection
Chipkarte
Computersicherheit
Datensicherung
Drahtloses Sensorsystem
Kryptoanalyse
Kryptosystem
Trusted Computing
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Cheju-do (2008)
Kongress.
Form Electronic book
Author Chung, Kyo-Il.
Sohn, Kiwook.
Yung, Moti.
ISBN 9783642003066
3642003060
3642003052
9783642003059
Other Titles WISA 2008