Skip to main content
  • Conference proceedings
  • © 2005

Information Security Applications

5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3325)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISA: International Conference on Information Security Applications

Conference proceedings info: WISA 2004.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

  2. Network/Computer Security

    1. Impacts of Security Protocols on Real-Time Multimedia Communications

      • Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland
      Pages 1-13
    2. An Improvement on Privacy and Authentication in GSM

      • Young Jae Choi, Soon Ja Kim
      Pages 14-26
    3. Encrypted Watermarks and Linux Laptop Security

      • Markku-Juhani O. Saarinen
      Pages 27-38
  3. Public Key Schemes I

    1. Custodian-Hiding Verifiable Encryption

      • Joseph K. Liu, Victor K. Wei, Duncan S. Wong
      Pages 51-64
    2. Proving Key Usage

      • Malek Bechlaghem, Vincent Rijmen
      Pages 65-72
    3. Public Key Encryption with Conjunctive Field Keyword Search

      • Dong Jin Park, Kihyun Kim, Pil Joong Lee
      Pages 73-86
  4. Intrusion Detection I

    1. A Probabilistic Method for Detecting Anomalous Program Behavior

      • Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai
      Pages 87-98
    2. Service Discrimination and Audit File Reduction for Effective Intrusion Detection

      • Fernando Godínez, Dieter Hutter, Raúl Monroy
      Pages 99-113
    3. IDS False Alarm Filtering Using KNN Classifier

      • Kwok Ho Law, Lam For Kwok
      Pages 114-121
  5. Watermarking/Anti-spamming

    1. Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking

      • Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, Young-Ho Suh
      Pages 122-134
    2. Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment

      • Manabu Iwanaga, Toshihiro Tabata, Kouichi Sakurai
      Pages 135-143
  6. Public Key Schemes II

    1. Efficient Authenticated Key Agreement Protocol for Dynamic Groups

      • Kui Ren, Hyunrok Lee, Kwangjo Kim, Taewhan Yoo
      Pages 144-159
    2. A Ring Signature Scheme Using Bilinear Pairings

      • Jing Xu, Zhenfeng Zhang, Dengguo Feng
      Pages 160-169
    3. Verifiable Pairing and Its Applications

      • Sherman S. M. Chow
      Pages 170-187
  7. Intrusion Detection II

    1. Application of Content Computing in Honeyfarm

      • Yi-Yuan Huang, Kwok-Yan Lam, Siu-Leung Chung, Chi-Hung Chi, Jia-Guang Sun
      Pages 211-222
  8. Digital Rights Management

    1. License Protection with a Tamper-Resistant Token

      • Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin
      Pages 223-237

Other Volumes

  1. Information Security Applications

About this book

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications from the academic community as well as from the industry. The workshop program covers a wide range of security aspects including cryptography, cryptanalysis, network/system security and implementation aspects. The programcommittee received169 papersfrom 22 countries,andaccepted 37 papers for a full presentation track and 30 papers for a short presentation track. Each paper was carefully evaluated through peer-review by at least three members of the programcommittee. This volume contains revised versions of 36 papers accepted and presented in the full presentation track. Short papers were only published in the WISA 2004 pre-proceedings as preliminary versions and are allowed to be published elsewhere as extended versions. In addition to the contributed papers, Professors Gene Tsudik and Ross Andersongaveinvitedtalks,entitledSecurityinOutsourcedDatabasesandWhat does ‘Security’ mean for Ubiquitous Applications?, respectively.

Editors and Affiliations

  • Dept. of Computer Engineering, Sejong University, Seoul, Korea

    Chae Hoon Lim

  • Computer Science Department, Google Inc. and Columbia University, New York, NY, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access