Advertisement

Information Security Applications

7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers

  • Editors
  • Jae Kwang Lee
  • Okyeon Yi
  • Moti Yung
Conference proceedings WISA 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4298)

Table of contents

  1. Front Matter
  2. Public Key Crypto Applications/Virus Protection

    1. Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie
      Pages 1-14
    2. Ki Hun Lee, Yuna Kim, Sung Je Hong, Jong Kim
      Pages 45-59
  3. Cyber Indication/Intrusion Detection

  4. Biometrics/Security Trust Management

    1. Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Okyeon Yi, Namil Lee et al.
      Pages 100-109
    2. Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park
      Pages 110-120
  5. Secure Software/Systems

    1. Yoonkyung Kim, Byeong-Mo Chang
      Pages 133-146
    2. Feng Cheng, Christoph Meinel
      Pages 147-159
  6. Smart Cards/Secure Hardware

    1. HyungSo Yoo, Christoph Herbst, Stefan Mangard, Elisabeth Oswald, SangJae Moon
      Pages 160-172
    2. Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim
      Pages 173-186
    3. Chin-Chen Chang, Chia-Chi Wu
      Pages 187-197
  7. Mobile Security

    1. Youngok Jeong, Younggoo Han, Hyunwoo Kim, Woochul Shim, Jaehong Kim, Sehun Kim
      Pages 198-210
    2. Hyun-Sun Kang, Chang-Seop Park
      Pages 211-224
  8. DRM/Information Hiding/Ubiquitous Computing Security/P2P Security

    1. Harikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Jan Martin Surminen
      Pages 237-251
    2. Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa
      Pages 252-266
    3. Mihui Kim, Inshil Doh, Kijoon Chae
      Pages 267-281
    4. Jabeom Gu, Jaehoon Nah, Cheoljoo Chae, Jaekwang Lee, Jongsoo Jang
      Pages 282-296
  9. Privacy/Anonymity

    1. Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jae-Il Lee
      Pages 297-311
    2. Takayuki Tobita, Hironori Yamamoto, Hiroshi Doi, Keigo Majima
      Pages 324-338
    3. Naoyuki Yamashita, Keisuke Tanaka
      Pages 339-348
  10. Internet and Wireless Security

    1. Chanil Park, Junbeom Hur, Chanoe Kim, Young-joo Shin, Hyunsoo Yoon
      Pages 349-363
    2. Hiroaki Kikuchi, Masato Terada
      Pages 381-390
    3. Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi
      Pages 391-404
  11. Back Matter

About these proceedings

Keywords

AES DRM IPv6 Information Public Key SQL Smart Card Ubiquitous Computing access control algorithm anonymity cryptographic hardware cryptographic protocols data security privacy

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-71093-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-71092-9
  • Online ISBN 978-3-540-71093-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site