Information Security Applications

5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers

  • Chae Hoon Lim
  • Moti Yung
Conference proceedings WISA 2004

DOI: 10.1007/b103174

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3325)

Table of contents (36 papers)

  1. Front Matter
  2. Network/Computer Security

    1. Impacts of Security Protocols on Real-Time Multimedia Communications
      Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland
      Pages 1-13
    2. An Improvement on Privacy and Authentication in GSM
      Young Jae Choi, Soon Ja Kim
      Pages 14-26
    3. Encrypted Watermarks and Linux Laptop Security
      Markku-Juhani O. Saarinen
      Pages 27-38
  3. Public Key Schemes I

    1. Custodian-Hiding Verifiable Encryption
      Joseph K. Liu, Victor K. Wei, Duncan S. Wong
      Pages 51-64
    2. Proving Key Usage
      Malek Bechlaghem, Vincent Rijmen
      Pages 65-72
    3. Public Key Encryption with Conjunctive Field Keyword Search
      Dong Jin Park, Kihyun Kim, Pil Joong Lee
      Pages 73-86
  4. Intrusion Detection I

    1. A Probabilistic Method for Detecting Anomalous Program Behavior
      Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai
      Pages 87-98
    2. Service Discrimination and Audit File Reduction for Effective Intrusion Detection
      Fernando Godínez, Dieter Hutter, Raúl Monroy
      Pages 99-113
    3. IDS False Alarm Filtering Using KNN Classifier
      Kwok Ho Law, Lam For Kwok
      Pages 114-121
  5. Watermarking/Anti-spamming

    1. Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking
      Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, Young-Ho Suh
      Pages 122-134
    2. Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment
      Manabu Iwanaga, Toshihiro Tabata, Kouichi Sakurai
      Pages 135-143
  6. Public Key Schemes II

    1. Efficient Authenticated Key Agreement Protocol for Dynamic Groups
      Kui Ren, Hyunrok Lee, Kwangjo Kim, Taewhan Yoo
      Pages 144-159
    2. A Ring Signature Scheme Using Bilinear Pairings
      Jing Xu, Zhenfeng Zhang, Dengguo Feng
      Pages 160-169
    3. Verifiable Pairing and Its Applications
      Sherman S. M. Chow
      Pages 170-187
  7. Intrusion Detection II

    1. Application of Content Computing in Honeyfarm
      Yi-Yuan Huang, Kwok-Yan Lam, Siu-Leung Chung, Chi-Hung Chi, Jia-Guang Sun
      Pages 211-222
  8. Digital Rights Management

    1. License Protection with a Tamper-Resistant Token
      Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin
      Pages 223-237

About these proceedings


The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications from the academic community as well as from the industry. The workshop program covers a wide range of security aspects including cryptography, cryptanalysis, network/system security and implementation aspects. The programcommittee received169 papersfrom 22 countries,andaccepted 37 papers for a full presentation track and 30 papers for a short presentation track. Each paper was carefully evaluated through peer-review by at least three members of the programcommittee. This volume contains revised versions of 36 papers accepted and presented in the full presentation track. Short papers were only published in the WISA 2004 pre-proceedings as preliminary versions and are allowed to be published elsewhere as extended versions. In addition to the contributed papers, Professors Gene Tsudik and Ross Andersongaveinvitedtalks,entitledSecurityinOutsourcedDatabasesandWhat does ‘Security’ mean for Ubiquitous Applications?, respectively.


Information Linux Smart Card applied cryptography communication computer security cryptographic attacks data security information security intrusion detection privacy public key cryptography secure networking security systems security

Editors and affiliations

  • Chae Hoon Lim
    • 1
  • Moti Yung
    • 2
  1. 1.Dept. of Computer EngineeringSejong UniversitySeoulKorea
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew York, NYUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-24015-0
  • Online ISBN 978-3-540-31815-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349