Information Security Applications: 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 5379 : Security and Cryptology

ISBN: 3642003052, 9783642003059

Size: 7 MB (7525171 bytes)

Pages: 334/343

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Christoph Herbst, Marcel Medwed (auth.), Kyo-Il Chung, Kiwook Sohn, Moti Yung (eds.)3642003052, 9783642003059

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Workshop on Information Security Applications, WISA 2008, held in Jeju Island, Korea, during September 23-25, 2008.

The 24 revised full papers presented were carefully reviewed and selected from a total of 161 submissions. The papers are organized in topical sections on smart card and secure hardware, wireless and sensor network security, public key crypto applications, privacy and anonymity, n/w security and intrusion detection, as well as application security and trust management.


Table of contents :
Front Matter….Pages –
Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation….Pages 1-13
Template Attacks on ECDSA….Pages 14-27
Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool….Pages 28-40
Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network….Pages 41-55
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol….Pages 56-68
Securing Layer-2 Path Selection in Wireless Mesh Networks….Pages 69-83
Public Key Authentication with Memory Tokens….Pages 84-98
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures….Pages 99-114
Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme….Pages 115-129
Sanitizable and Deletable Signature….Pages 130-144
An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data….Pages 145-159
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition….Pages 160-173
Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512….Pages 174-189
A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model….Pages 190-200
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence….Pages 201-210
Image-Feature Based Human Identification Protocols on Limited Display Devices….Pages 211-224
Ternary Subset Difference Method and Its Quantitative Analysis….Pages 225-239
Data Deletion with Provable Security….Pages 240-255
A Probing Attack on AES….Pages 256-265
On Avoiding ZVP-Attacks Using Isogeny Volcanoes….Pages 266-277
Security Analysis of DRBG Using HMAC in NIST SP 800-90….Pages 278-291
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module….Pages 292-304
An Improved Distributed Key Management Scheme in Wireless Sensor Networks….Pages 305-319
Protection Profile for Connected Interoperable DRM Framework….Pages 320-332
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Information Security Applications: 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers”
Shopping Cart
Scroll to Top