Information Security Applications

4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers

  • Ki-Joon Chae
  • Moti Yung
Conference proceedings WISA 2003

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2908)

Table of contents

  1. Front Matter
  2. Network Security

    1. Kyoil Kim, Jacob A. Abraham, Jayanta Bhadra
      Pages 1-15
    2. Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii
      Pages 16-26
    3. Sung-Do Chi, Jong Sou Park, Jang-Se Lee
      Pages 27-41
  3. Mobile Security

    1. Kwok-Yan Lam, Xi-Bin Zhao, Siu-Leung Chung, Ming Gu, Jia-Guang Sun
      Pages 42-54
    2. Hyun-suk Lee, Hyeog Man Kwon, Young Ik Eom
      Pages 55-68
    3. SuGil Choi, Kwangjo Kim, ByeongGon Kim
      Pages 69-83
  4. Intrusion Detection

  5. Internet Security

    1. Dae-Sik Choi, Eul Gyu Im, Cheol-Won Lee
      Pages 124-134
    2. Paulo S. Pagliusi, Chris J. Mitchell
      Pages 135-149
    3. Jaehoon Nah, Hyeokchan Kwon, Sungwon Sohn, Cheehang Park, Chimoon Han
      Pages 150-161
  6. Secure Software, Hardware, and Systems I

    1. Yeongsub Cho, Sangrae Cho, Daeseon Choi, Seunghun Jin, Kyoil Chung, Cheehang Park
      Pages 162-173
    2. Byoung Joon Min, Sung Ki Kim, Joong Sup Choi
      Pages 174-187
    3. Gildas Avoine, Serge Vaudenay
      Pages 188-202
  7. Secure Software, Hardware, and Systems II

    1. Roman Novak
      Pages 203-216
    2. Geun-Sil Song, Mi-Ae Kim, Won-Hyung Lee
      Pages 217-226
  8. E-commerce Security

    1. Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan
      Pages 244-256
    2. Navapot Prakobpol, Yongyuth Permpoontanalarp
      Pages 257-271
    3. Ming Yao, Ernest Foo, Kun Peng, Ed Dawson
      Pages 272-285
  9. Digital Rights Management

    1. Ahmad-Reza Sadeghi, Christian Stüble
      Pages 286-302
    2. Kazuhide Fukushima, Kouichi Sakurai
      Pages 303-316
  10. Biometrics and Human Interfaces I

    1. Hwanjong Song, Ukil Yang, Kwanghoon Sohn
      Pages 333-347
    2. H. Kang, Y. Han, H. Kim, W. Choi, Y. Chung
      Pages 348-354
    3. Daesung Moon, Youn Hee Gil, Dosung Ahn, Sung Bum Pan, Yongwha Chung, Chee Hang Park
      Pages 355-364
  11. Biometrics and Human Interfaces II

    1. Byungjun Son, Gyundo Kee, Yungcheol Byun, Yillbyung Lee
      Pages 365-379
    2. Suyoung Chi, Jaeyeon Lee, Jung Soh, Dohyung Kim, Weongeun Oh, Changhun Kim
      Pages 395-409
  12. Public Key Cryptography / Key Management

    1. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
      Pages 410-424
    2. Taekyoung Kwon, Seongan Lim
      Pages 442-457
  13. Applied Cryptography

    1. Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle
      Pages 458-473
    2. Bon Wook Koo, Hwan Seok Jang, Jung Hwan Song
      Pages 489-503
  14. Back Matter

About these proceedings


The4thWorkshoponInformationSecurityApplications(WISA2003)wassp- sored by the following Korean organizations and government bodies: the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and TelecommunicationsResearchInstitute(ETRI),andtheMinistryofInformation and Communication (MIC). The workshop was held in Jeju Island, Korea - ring August 25–27, 2003. This international workshop provided ample technical sessions covering a large spectrum of information security applications. Subjects covered included network/mobile security, electronic commerce security, digital rights management, intrusion detection, secure systems and applications, bio- trics and human interfaces, public key cryptography, and applied cryptography. The program committee received 200 papers from 23 countries (representing most geographic areas where security and applied cryptography research is c- ductedthroughouttheworld).Eachsubmittedpaperwaspeer-reviewedbythree program committee members. This year, we had two tracks: long and short p- sentation tracks. We selected 36 papers for the long presentation track and 34 papers for the short presentation tracks. This volume contains revised versions of papers accepted for the long presentation track. We would like to note that getting accepted to both tracks was an achievement to be proud of, given the competitive nature of WISA this year. Papers in the short presentation track were only published in the WISA preproceedings as preliminary notes; ext- dedversionsofthesenotesmaybepublishedbyfutureconferencesorworkshops.


Information Public Key Signatur architecture data security digital rights management e-commerce security information security intrusion detection mobile security model checking network security security applications systems security verification

Editors and affiliations

  • Ki-Joon Chae
    • 1
  • Moti Yung
    • 2
  1. 1.Dept. of Computer Science and EngineeringEwha Womans UniversityKorea
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-20827-3
  • Online ISBN 978-3-540-24591-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site