


default search action
WISA 2007: Jeju Island, Korea
- Sehun Kim, Moti Yung, Hyung-Woo Lee:

Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4867, Springer 2008, ISBN 978-3-540-77534-8
Public Key Crypto Applications
- Masaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto:

Universal etaT Pairing Algorithm over Arbitrary Extension Degree. 1-15 - Wei Wu, Yi Mu, Willy Susilo

, Xinyi Huang:
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. 16-29 - Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo:

Secret Signatures: How to Achieve Business Privacy Efficiently? 30-47
Biometrics/Information Hiding
- Jihyeon Jang, Stephen J. Elliott, Hakil Kim:

Implementation of BioAPI Conformance Test Suite Using BSP Testing Model. 48-60 - Yongxin Zhou, Alec Main, Yuan Xiang Gu, Harold Johnson:

Information Hiding in Software with Mixed Boolean-Arithmetic Transforms. 61-75 - Shijun Xiang, Hyoung-Joong Kim:

Geometrically Invariant Image Watermarking in the DWT Domain. 76-90
Secure Hardware
- Jae-Deok Lim, Sung-Kyong Un, Jeong-Nyeo Kim, ChoelHoon Lee:

Implementation of LSM-Based RBAC Module for Embedded System. 91-101 - Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede

:
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations. 102-114 - Yong Ki Lee, Ingrid Verbauwhede

:
A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor. 115-127
Secure Systems
- Yoshiki Sameshima, Hideaki Saisho, Tsutomu Matsumoto, Norihisa Komoda:

Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine. 128-141 - Frederic Stumpf, Patrick Röder, Claudia Eckert:

An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks. 142-156 - William O. Wilson, Jan Feyereisl, Uwe Aickelin

:
Detecting Motifs in System Call Sequences. 157-172
Wireless and Mobile Security
- Toru Hashimoto, Takashi Itoh, Masazumi Ueba, Hisato Iwai, Hideichi Sasaoka, Kazukuni Kobara, Hideki Imai:

Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System. 173-187 - Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin:

Breaking 104 Bit WEP in Less Than 60 Seconds. 188-202 - Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:

Efficient Implementation of the Pairing on Mobilephones Using BREW. 203-214
Application Security/Secure Systems
- Hidema Tanaka, Yasuo Hatano, Nobuyuki Sugio, Toshinobu Kaneko:

Security Analysis of MISTY1. 215-226 - Emmanuel Prouff, Matthieu Rivain:

A Generic Method for Secure SBox Implementation. 227-244 - Swee-Won Lo, Raphael C.-W. Phan, Bok-Min Goi:

On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences. 245-265
Access Control/DB Security
- Lilong Han, Qingtang Liu, Zongkai Yang:

Authorization Constraints Specification of RBAC. 266-276 - Zhuo Tang, Ruixuan Li, Zhengding Lu, Zhumu Wen:

Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk. 277-290 - Lei Xia, Wei Huang, Hao Huang:

A Compositional Multiple Policies Operating System Security Model. 291-302
Smart Cards/Secure Systems
- Colin D. Walter:

Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones. 303-316 - Robert P. McEvoy, Michael Tunstall

, Colin C. Murphy, William P. Marnane:
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. 317-332 - JaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen:

Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. 333-344
Anonymity and P2P Security
- Shenkun Xu, Xiaojun Ye:

Risk & Distortion Based K-Anonymity. 345-358 - Myeonggil Choi, Sangmun Shin:

Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System. 359-370 - Junsheng Chang, Huaimin Wang, Gang Yin, Yang-Bin Tang:

ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems. 371-386

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














