Information Security Applications

5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers

  • Chae Hoon Lim
  • Moti Yung
Conference proceedings WISA 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3325)

Table of contents

  1. Front Matter
  2. Network/Computer Security

    1. Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland
      Pages 1-13
    2. Young Jae Choi, Soon Ja Kim
      Pages 14-26
    3. Markku-Juhani O. Saarinen
      Pages 27-38
  3. Public Key Schemes I

    1. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
      Pages 51-64
    2. Malek Bechlaghem, Vincent Rijmen
      Pages 65-72
    3. Dong Jin Park, Kihyun Kim, Pil Joong Lee
      Pages 73-86
  4. Intrusion Detection I

    1. Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai
      Pages 87-98
    2. Fernando Godínez, Dieter Hutter, Raúl Monroy
      Pages 99-113
    3. Kwok Ho Law, Lam For Kwok
      Pages 114-121
  5. Watermarking/Anti-spamming

    1. Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, Young-Ho Suh
      Pages 122-134
    2. Manabu Iwanaga, Toshihiro Tabata, Kouichi Sakurai
      Pages 135-143
  6. Public Key Schemes II

    1. Kui Ren, Hyunrok Lee, Kwangjo Kim, Taewhan Yoo
      Pages 144-159
    2. Jing Xu, Zhenfeng Zhang, Dengguo Feng
      Pages 160-169
    3. Sherman S. M. Chow
      Pages 170-187
  7. Intrusion Detection II

    1. Yi-Yuan Huang, Kwok-Yan Lam, Siu-Leung Chung, Chi-Hung Chi, Jia-Guang Sun
      Pages 211-222
  8. Digital Rights Management

    1. Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin
      Pages 223-237

About these proceedings


The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications from the academic community as well as from the industry. The workshop program covers a wide range of security aspects including cryptography, cryptanalysis, network/system security and implementation aspects. The programcommittee received169 papersfrom 22 countries,andaccepted 37 papers for a full presentation track and 30 papers for a short presentation track. Each paper was carefully evaluated through peer-review by at least three members of the programcommittee. This volume contains revised versions of 36 papers accepted and presented in the full presentation track. Short papers were only published in the WISA 2004 pre-proceedings as preliminary versions and are allowed to be published elsewhere as extended versions. In addition to the contributed papers, Professors Gene Tsudik and Ross Andersongaveinvitedtalks,entitledSecurityinOutsourcedDatabasesandWhat does ‘Security’ mean for Ubiquitous Applications?, respectively.


Information Linux Smart Card applied cryptography communication computer security cryptographic attacks data security information security intrusion detection privacy public key cryptography secure networking security systems security

Editors and affiliations

  • Chae Hoon Lim
    • 1
  • Moti Yung
    • 2
  1. 1.Dept. of Computer EngineeringSejong UniversitySeoulKorea
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew York, NYUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-24015-0
  • Online ISBN 978-3-540-31815-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book