Advertisement

Information Security Applications

8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers

  • Sehun Kim
  • Moti Yung
  • Hyung-Woo Lee

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4867)

Table of contents

  1. Front Matter
  2. Public Key Crypto Applications

    1. Masaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto
      Pages 1-15
    2. Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo
      Pages 30-47
  3. Biometrics/Information Hiding

    1. Jihyeon Jang, Stephen J. Elliott, Hakil Kim
      Pages 48-60
    2. Yongxin Zhou, Alec Main, Yuan X. Gu, Harold Johnson
      Pages 61-75
    3. Shijun Xiang, Hyoung-Joong Kim
      Pages 76-90
  4. Secure Hardware

    1. Jae-Deok Lim, Sung-Kyong Un, Jeong-Nyeo Kim, ChoelHoon Lee
      Pages 91-101
  5. Secure Systems

    1. Yoshiki Sameshima, Hideaki Saisho, Tsutomu Matsumoto, Norihisa Komoda
      Pages 128-141
    2. Frederic Stumpf, Patrick Röder, Claudia Eckert
      Pages 142-156
    3. William O. Wilson, Jan Feyereisl, Uwe Aickelin
      Pages 157-172
  6. Wireless and Mobile Security

    1. Toru Hashimoto, Takashi Itoh, Masazumi Ueba, Hisato Iwai, Hideichi Sasaoka, Kazukuni Kobara et al.
      Pages 173-187
    2. Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin
      Pages 188-202
    3. Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka
      Pages 203-214
  7. Application Security/Secure Systems

    1. Hidema Tanaka, Yasuo Hatano, Nobuyuki Sugio, Toshinobu Kaneko
      Pages 215-226
    2. Emmanuel Prouff, Matthieu Rivain
      Pages 227-244
  8. Access Control/DB Security

    1. Lilong Han, Qingtan Liu, Zongkai Yang
      Pages 266-276
    2. Zhuo Tang, Ruixuan Li, Zhengding Lu, Zhumu Wen
      Pages 277-290
    3. Lei Xia, Wei Huang, Hao Huang
      Pages 291-302
  9. Smart Cards/Secure Systems

    1. Robert McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane
      Pages 317-332
    2. JaeCheol Ha, JeaHoon Park, SangJae Moon, SungMing Yen
      Pages 333-344
  10. Anonymity and P2P Security

    1. Shenkun Xu, Xiaojun Ye
      Pages 345-358
    2. Junsheng Chang, Huaimin Wang, Gang Yin, Yangbin Tang
      Pages 371-386
  11. Back Matter

About these proceedings

Introduction

The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27–29, 2007. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We were very pleased and honored to serve as the Program Committee Co-chairs of WISA 2007. The Program Committee received 95 papers from 20 countries, and accepted 27 papers for the full presentation track. The papers were selected after an extensive and careful refereeing process in which each paper was reviewed by at least three members of the Program Committee. In addition to the contributed papers, the workshop had three special talks. Moti Yung gave a tutorial talk, entitled “Somebody You Know: The Fourth Factor of Authentication.” Kihong Park and Nasir Memon gave invited talks, entitled “Reactive Zero-Day Attack Protection” and “Securing Biometric T- plates,” respectively. Many people deserve our gratitude for their generous contributions to the success of the workshop. We would like to thank all the people involved in the technical program and in organizing the workshop. We are very grateful to the ProgramCommitteemembersandtheexternalrefereesfortheir timeande?orts in reviewing the submissions and selecting the accepted papers. We also express our special thanks to the Organizing Committee members for their hard work in organizing the workshop.

Keywords

AES Error-correcting Code Signatur access control algorithm algorithms anonymity authentication biometrics block ciphers cryptanalysis cryptology data security privacy security

Editors and affiliations

  • Sehun Kim
    • 1
  • Moti Yung
    • 2
  • Hyung-Woo Lee
    • 3
  1. 1.Department of Industrial EngineeringKAISTDaejeonKorea
  2. 2.RSA Labs, EMC Corp. and Department of Computer ScienceColumbia University,USA
  3. 3.Div. Computer Information of SoftwareHanshin UniversityOsanSouth Korea

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-77535-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-77534-8
  • Online ISBN 978-3-540-77535-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering