LEADER 05523nam 22008775 450 001 9910484269603321 005 20230412073850.0 010 $a1-280-86454-0 010 $a9786610864546 010 $a3-540-71093-0 024 7 $a10.1007/978-3-540-71093-6 035 $a(CKB)1000000000490680 035 $a(EBL)3036686 035 $a(SSID)ssj0000299650 035 $a(PQKBManifestationID)11237682 035 $a(PQKBTitleCode)TC0000299650 035 $a(PQKBWorkID)10242008 035 $a(PQKB)11526976 035 $a(DE-He213)978-3-540-71093-6 035 $a(MiAaPQ)EBC3036686 035 $a(MiAaPQ)EBC6283387 035 $a(PPN)123160634 035 $a(EXLCZ)991000000000490680 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security Applications$b[electronic resource] $e7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers /$fedited by Jae-Kwang Lee, Okyeon Yi, Moti Yung 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (417 p.) 225 1 $aSecurity and Cryptology ;$v4298 300 $aDescription based upon print version of record. 311 $a3-540-71092-2 320 $aIncludes bibliographical references and index. 327 $aPublic Key Crypto Applications/Virus Protection -- Controllable Ring Signatures -- Efficient User Authentication and Key Agreement in Wireless Sensor Networks -- Identity-Based Key Issuing Without Secure Channel in a Broad Area -- PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution -- Cyber Indication/Intrusion Detection -- SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks -- SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment -- sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm -- Biometrics/Security Trust Management -- Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords -- Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification -- Quality Assurance for Evidence Collection in Network Forensics -- Secure Software/Systems -- Visualization of Permission Checks in Java Using Static Analysis -- Deployment of Virtual Machines in Lock-Keeper -- Smart Cards/Secure Hardware -- Investigations of Power Analysis Attacks and Countermeasures for ARIA -- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols -- A Novel Key Agreement Scheme in a Multiple Server Environment -- Mobile Security -- Cost-Effective IDS Operating Scheme in MANETs -- Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6 -- A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones -- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security -- Distributed Management of OMA DRM Domains -- New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting -- A Key Management Based on Multiple Regression in Hierarchical Sensor Network -- Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks -- Privacy/Anonymity -- Privacy Protection in PKIs: A Separation-of-Authority Approach -- Three-Party Password Authenticated Key Agreement Resistant to Server Compromise -- Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature -- Secret Handshake with Multiple Groups -- Internet and Wireless Security -- Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs -- EAP Using the Split Password-Based Authenticated Key Agreement -- How Many Malicious Scanners Are in the Internet? -- E-Passport: The Global Traceability Or How to Feel Like a UPS Package. 410 0$aSecurity and Cryptology ;$v4298 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aAlgorithms 606 $aComputer networks 606 $aElectronic data processing?Management 606 $aComputers, Special purpose 606 $aCryptology 606 $aData and Information Security 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aIT Operations 606 $aSpecial Purpose and Application-Based Systems 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aAlgorithms. 615 0$aComputer networks. 615 0$aElectronic data processing?Management. 615 0$aComputers, Special purpose. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aAlgorithms. 615 24$aComputer Communication Networks. 615 24$aIT Operations. 615 24$aSpecial Purpose and Application-Based Systems. 676 $a005.8 702 $aLee$b Jae-Kwang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYi$b Okyeon$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484269603321 996 $aInformation Security Applications$92569902 997 $aUNINA