Borrow it
- African Studies Library
- Alumni Medical Library
- Astronomy Library
- Fineman and Pappas Law Libraries
- Frederick S. Pardee Management Library
- Howard Gotlieb Archival Research Center
- Mugar Memorial Library
- Music Library
- Pikering Educational Resources Library
- School of Theology Library
- Science & Engineering Library
- Stone Science Library
The Resource Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, edited by Sehun Kim, Moti Yung, Hyung-Woo Lee, (electronic resource)
Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, edited by Sehun Kim, Moti Yung, Hyung-Woo Lee, (electronic resource)
Resource Information
The item Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, edited by Sehun Kim, Moti Yung, Hyung-Woo Lee, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, edited by Sehun Kim, Moti Yung, Hyung-Woo Lee, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
- Summary
- This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007. The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on Public Key Crypto Applications, Biometrics/Information Hiding, Secure Hardware, Secure Systems, Wireless and Mobile Security, Application Security/Secure Systems, Access Control/DB Security, Smart Cards/Secure Systems and Anonymity and P2P Security
- Language
- eng
- Contents
-
- Public Key Crypto Applications
- Universal ? T Pairing Algorithm over Arbitrary Extension Degree
- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction
- Secret Signatures: How to Achieve Business Privacy Efficiently?
- Biometrics/Information Hiding
- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model
- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms
- Geometrically Invariant Image Watermarking in the DWT Domain
- Secure Hardware
- Implementation of LSM-Based RBAC Module for Embedded System
- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations
- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor
- Secure Systems
- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine
- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks
- Detecting Motifs in System Call Sequences
- Wireless and Mobile Security
- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System
- Breaking 104 Bit WEP in Less Than 60 Seconds
- Efficient Implementation of the Pairing on Mobilephones Using BREW
- Application Security/Secure Systems
- Security Analysis of MISTY1
- A Generic Method for Secure SBox Implementation
- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences
- Access Control/DB Security
- Authorization Constraints Specification of RBAC
- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk
- A Compositional Multiple Policies Operating System Security Model
- Smart Cards/Secure Systems
- Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones
- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures
- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC
- Anonymity and P2P Security
- Risk & Distortion Based K-Anonymity
- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System
- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems
- Isbn
- 9783540775355
- Label
- Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
- Title
- Information Security Applications
- Title remainder
- 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
- Statement of responsibility
- edited by Sehun Kim, Moti Yung, Hyung-Woo Lee
- Subject
-
- Computer Communication Networks
- Computer Science
- Computer science
- Computer software
- Data Encryption
- Data encryption (Computer science)
- Data protection
- Electronic resources
- Information Systems
- Management of Computing and Information Systems
- Software engineering
- Special Purpose and Application-Based Systems
- Systems and Data Security
- Algorithm Analysis and Problem Complexity
- Language
- eng
- Summary
- This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007. The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on Public Key Crypto Applications, Biometrics/Information Hiding, Secure Hardware, Secure Systems, Wireless and Mobile Security, Application Security/Secure Systems, Access Control/DB Security, Smart Cards/Secure Systems and Anonymity and P2P Security
- http://library.link/vocab/creatorName
- Kim, Sehun
- Image bit depth
- 0
- LC call number
- QA76.9.A25
- Literary form
- non fiction
- http://library.link/vocab/relatedWorkOrContributorName
-
- Yung, Moti.
- Lee, Hyung-Woo.
- SpringerLink
- Series statement
- Lecture Notes in Computer Science,
- Series volume
- 4867
- http://library.link/vocab/subjectName
-
- Computer science
- Computer Communication Networks
- Software engineering
- Data protection
- Data encryption (Computer science)
- Computer software
- Information Systems
- Computer Science
- Data Encryption
- Systems and Data Security
- Algorithm Analysis and Problem Complexity
- Computer Communication Networks
- Management of Computing and Information Systems
- Special Purpose and Application-Based Systems
- Label
- Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, edited by Sehun Kim, Moti Yung, Hyung-Woo Lee, (electronic resource)
- Antecedent source
- mixed
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Public Key Crypto Applications -- Universal ? T Pairing Algorithm over Arbitrary Extension Degree -- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction -- Secret Signatures: How to Achieve Business Privacy Efficiently? -- Biometrics/Information Hiding -- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model -- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms -- Geometrically Invariant Image Watermarking in the DWT Domain -- Secure Hardware -- Implementation of LSM-Based RBAC Module for Embedded System -- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations -- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor -- Secure Systems -- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine -- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks -- Detecting Motifs in System Call Sequences -- Wireless and Mobile Security -- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System -- Breaking 104 Bit WEP in Less Than 60 Seconds -- Efficient Implementation of the Pairing on Mobilephones Using BREW -- Application Security/Secure Systems -- Security Analysis of MISTY1 -- A Generic Method for Secure SBox Implementation -- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences -- Access Control/DB Security -- Authorization Constraints Specification of RBAC -- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk -- A Compositional Multiple Policies Operating System Security Model -- Smart Cards/Secure Systems -- Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones -- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures -- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC -- Anonymity and P2P Security -- Risk & Distortion Based K-Anonymity -- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System -- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems
- Dimensions
- unknown
- File format
- multiple file formats
- Form of item
- electronic
- Isbn
- 9783540775355
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-540-77535-5
- Other physical details
- online resource.
- Quality assurance targets
- absent
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (DE-He213)978-3-540-77535-5
- Label
- Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, edited by Sehun Kim, Moti Yung, Hyung-Woo Lee, (electronic resource)
- Antecedent source
- mixed
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Public Key Crypto Applications -- Universal ? T Pairing Algorithm over Arbitrary Extension Degree -- Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction -- Secret Signatures: How to Achieve Business Privacy Efficiently? -- Biometrics/Information Hiding -- Implementation of BioAPI Conformance Test Suite Using BSP Testing Model -- Information Hiding in Software with Mixed Boolean-Arithmetic Transforms -- Geometrically Invariant Image Watermarking in the DWT Domain -- Secure Hardware -- Implementation of LSM-Based RBAC Module for Embedded System -- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations -- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor -- Secure Systems -- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine -- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks -- Detecting Motifs in System Call Sequences -- Wireless and Mobile Security -- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System -- Breaking 104 Bit WEP in Less Than 60 Seconds -- Efficient Implementation of the Pairing on Mobilephones Using BREW -- Application Security/Secure Systems -- Security Analysis of MISTY1 -- A Generic Method for Secure SBox Implementation -- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences -- Access Control/DB Security -- Authorization Constraints Specification of RBAC -- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk -- A Compositional Multiple Policies Operating System Security Model -- Smart Cards/Secure Systems -- Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones -- Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures -- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC -- Anonymity and P2P Security -- Risk & Distortion Based K-Anonymity -- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System -- ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems
- Dimensions
- unknown
- File format
- multiple file formats
- Form of item
- electronic
- Isbn
- 9783540775355
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-540-77535-5
- Other physical details
- online resource.
- Quality assurance targets
- absent
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (DE-He213)978-3-540-77535-5
Subject
- Computer Communication Networks
- Computer Science
- Computer science
- Computer software
- Data Encryption
- Data encryption (Computer science)
- Data protection
- Electronic resources
- Information Systems
- Management of Computing and Information Systems
- Software engineering
- Special Purpose and Application-Based Systems
- Systems and Data Security
- Algorithm Analysis and Problem Complexity
Member of
Library Locations
-
African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 -71.105717
-
Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 -71.107023
-
Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 -71.099547
-
Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 -71.108227
-
Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 -71.101425
-
School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 -71.107235
-
Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 -71.102257
-
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Information-Security-Applications--8th/2rnhbEnRLFI/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Information-Security-Applications--8th/2rnhbEnRLFI/">Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, edited by Sehun Kim, Moti Yung, Hyung-Woo Lee, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, edited by Sehun Kim, Moti Yung, Hyung-Woo Lee, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Information-Security-Applications--8th/2rnhbEnRLFI/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Information-Security-Applications--8th/2rnhbEnRLFI/">Information Security Applications : 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, edited by Sehun Kim, Moti Yung, Hyung-Woo Lee, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>