Advertisement

Information Security Applications

5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers

  • Chae Hoon Lim
  • Moti Yung
Conference proceedings WISA 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3325)

Table of contents

  1. Front Matter
  2. Network/Computer Security

    1. Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland
      Pages 1-13
    2. Young Jae Choi, Soon Ja Kim
      Pages 14-26
    3. Markku-Juhani O. Saarinen
      Pages 27-38
  3. Public Key Schemes I

    1. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
      Pages 51-64
    2. Malek Bechlaghem, Vincent Rijmen
      Pages 65-72
    3. Dong Jin Park, Kihyun Kim, Pil Joong Lee
      Pages 73-86
  4. Intrusion Detection I

    1. Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai
      Pages 87-98
    2. Fernando Godínez, Dieter Hutter, Raúl Monroy
      Pages 99-113
    3. Kwok Ho Law, Lam For Kwok
      Pages 114-121
  5. Watermarking/Anti-spamming

    1. Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, Young-Ho Suh
      Pages 122-134
    2. Manabu Iwanaga, Toshihiro Tabata, Kouichi Sakurai
      Pages 135-143
  6. Public Key Schemes II

    1. Kui Ren, Hyunrok Lee, Kwangjo Kim, Taewhan Yoo
      Pages 144-159
    2. Jing Xu, Zhenfeng Zhang, Dengguo Feng
      Pages 160-169
    3. Sherman S. M. Chow
      Pages 170-187
  7. Intrusion Detection II

    1. Yi-Yuan Huang, Kwok-Yan Lam, Siu-Leung Chung, Chi-Hung Chi, Jia-Guang Sun
      Pages 211-222
  8. Digital Rights Management

    1. Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin
      Pages 223-237
    2. Mira Kim, Kazukuni Kobara, Hideki Imai
      Pages 251-263
    3. Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
      Pages 264-277
  9. e-Commerce Security

    1. Sang Cheol Hwang, Dong Hoon Lee, Daewan Han, Jae-Cheol Ryou
      Pages 278-285
    2. Sangjin Kim, Heekuck Oh
      Pages 286-301
    3. Supakorn Kungpisdan, Phu Dung Le, Bala Srinivasan
      Pages 302-316
  10. Efficient Implementation

  11. Anonymous Communication

    1. Kenji Imamoto, Kouichi Sakurai
      Pages 375-387
    2. Gang Yao, Dengguo Feng
      Pages 388-399
    3. Marcin Gomułkiewicz, Marek Klonowski, Mirosław Kutyłowski
      Pages 400-410
  12. Side-Channel Attacks

    1. HyungSo Yoo, ChangKyun Kim, JaeCheol Ha, SangJae Moon, IlHwan Park
      Pages 411-424
    2. Elena Trichina, Lesya Korkishko
      Pages 425-439
    3. Christian Rechberger, Elisabeth Oswald
      Pages 440-456
    4. Hidema Tanaka, Osamu Takizawa, Akihiro Yamamura
      Pages 457-469
  13. Back Matter

About these proceedings

Introduction

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications from the academic community as well as from the industry. The workshop program covers a wide range of security aspects including cryptography, cryptanalysis, network/system security and implementation aspects. The programcommittee received169 papersfrom 22 countries,andaccepted 37 papers for a full presentation track and 30 papers for a short presentation track. Each paper was carefully evaluated through peer-review by at least three members of the programcommittee. This volume contains revised versions of 36 papers accepted and presented in the full presentation track. Short papers were only published in the WISA 2004 pre-proceedings as preliminary versions and are allowed to be published elsewhere as extended versions. In addition to the contributed papers, Professors Gene Tsudik and Ross Andersongaveinvitedtalks,entitledSecurityinOutsourcedDatabasesandWhat does ‘Security’ mean for Ubiquitous Applications?, respectively.

Keywords

Information Linux Smart Card applied cryptography communication computer security cryptographic attacks data security information security intrusion detection privacy public key cryptography secure networking security systems security

Editors and affiliations

  • Chae Hoon Lim
    • 1
  • Moti Yung
    • 2
  1. 1.Dept. of Computer EngineeringSejong UniversitySeoulKorea
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew York, NYUSA

Bibliographic information

  • DOI https://doi.org/10.1007/b103174
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-24015-0
  • Online ISBN 978-3-540-31815-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site