LEADER 05618nam 22008655 450 001 9910484509403321 005 20251226202614.0 010 $a3-540-33153-0 024 7 $a10.1007/11604938 035 $a(CKB)1000000000232746 035 $a(SSID)ssj0000318285 035 $a(PQKBManifestationID)11283552 035 $a(PQKBTitleCode)TC0000318285 035 $a(PQKBWorkID)10310174 035 $a(PQKB)10205452 035 $a(DE-He213)978-3-540-33153-7 035 $a(MiAaPQ)EBC3067535 035 $a(PPN)123130212 035 $a(BIP)13313349 035 $a(BIP)13248015 035 $a(EXLCZ)991000000000232746 100 $a20100302d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security Applications $e6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers /$fedited by Jooseok Song, Taekyoung Kwon 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XII, 378 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v3786 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-31012-6 320 $aIncludes bibliographical references and index. 327 $aSecurity Analysis and Attacks -- Security Weakness in Ren et al.?s Group Key Agreement Scheme Built on Secure Two-Party Protocols -- Cryptanalysis of Some Group-Oriented Proxy Signature Schemes -- Application of LFSRs in Time/Memory Trade-Off Cryptanalysis -- System Security -- An Alert Data Mining Framework for Network-Based Intrusion Detection System -- Key Factors Influencing Worm Infection in Enterprise Networks -- Evaluation of the Unified Modeling Language for Security Requirements Analysis -- Network Security -- A Simple and Efficient Conference Scheme for Mobile Communications -- A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network -- Efficient Multicast Stream Authentication for the Fully Adversarial Network Model -- Elastic Security QoS Provisioning for Telematics Applications -- DRM/Software Security -- An Improved Algorithm to Watermark Numeric Relational Data -- Video Fingerprinting System Using Wavelet and Error Correcting Code -- Secure Asymmetric Watermark Detection Without Secret of Modified Pixels -- Kimchi: A Binary Rewriting Defense Against Format String Attacks -- Software Protection Through Dynamic Code Mutation -- Efficient HW Implementation -- Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m ) -- Developing and Implementing IHPM on IXP 425 Network Processor Platforms -- Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices -- mCrypton ? A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors -- Side-Channel Attacks -- Practical Modifications of Leadbitter et al.?s Repeated-Bits Side-Channel Analysis on (EC)DSA -- A DPA Countermeasure by Randomized Frobenius Decomposition -- DPA Attack on the Improved Ha-Moon Algorithm -- An Efficient Masking Scheme for AES SoftwareImplementations -- Privacy/Anonymity -- Secure Multi-attribute Procurement Auction -- Oblivious Conjunctive Keyword Search -- Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption -- Efficient Implementation -- New Concept of Authority Range for Flexible Management of Role Hierarchy -- Role-Based Access Control Model for Ubiquitous Computing Environment -- Designing Security Auditing Protocol with Web Browsers. 330 $aThis book constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, WISA 2005, held in Jeju Island, Korea, in August 2005. The 29 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 168 submissions. The papers are organized in topical sections on security analysis and attacks, systems security, network security, DRM/software security, efficient HW implementation, side-channel attacks, privacy/anonymity, and efficient implementation. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v3786 606 $aCryptography 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aComputer networks 606 $aElectronic data processing$xManagement 606 $aComputers, Special purpose 606 $aCryptology 606 $aOperating Systems 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aIT Operations 606 $aSpecial Purpose and Application-Based Systems 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aOperating systems (Computers). 615 0$aAlgorithms. 615 0$aComputer networks. 615 0$aElectronic data processing$xManagement. 615 0$aComputers, Special purpose. 615 14$aCryptology. 615 24$aOperating Systems. 615 24$aAlgorithms. 615 24$aComputer Communication Networks. 615 24$aIT Operations. 615 24$aSpecial Purpose and Application-Based Systems. 676 $a005.8 701 $aSong$b JooSeok$01750381 701 $aKwon$b Taekyoung$01750382 701 $aYung$b Moti$01071902 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484509403321 996 $aInformation security applications$94185002 997 $aUNINA