Information Security Applications : 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers, edited by Ki-Joon Chae, Moti Yung, (electronic resource)
Resource Information
The instance Information Security Applications : 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers, edited by Ki-Joon Chae, Moti Yung, (electronic resource) represents a material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries. This resource is a combination of several types including: Instance, Electronic.
The Resource
Information Security Applications : 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers, edited by Ki-Joon Chae, Moti Yung, (electronic resource)
Resource Information
The instance Information Security Applications : 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers, edited by Ki-Joon Chae, Moti Yung, (electronic resource) represents a material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries. This resource is a combination of several types including: Instance, Electronic.
- Label
- Information Security Applications : 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers, edited by Ki-Joon Chae, Moti Yung, (electronic resource)
- Title remainder
- 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers
- Medium
- electronic resource
- Statement of responsibility
- edited by Ki-Joon Chae, Moti Yung
- Antecedent source
- mixed
- Carrier category
- online resource
- Carrier category code
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
- txt
- Content type MARC source
- rdacontent
- Contents
- Network Security -- Model Checking of Security Protocols with Pre-configuration -- Remote Access VPN with Port Protection Function by Mobile Codes -- A Role of DEVS Simulation for Information Assurance -- Mobile Security -- Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes -- Reliable Cascaded Delegation Scheme for Mobile Agent Environments -- Practical Solution for Location Privacy in Mobile IPv6 -- Intrusion Detection -- CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection -- Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System -- Towards a Global Security Architecture for Intrusion Detection and Reaction Management -- Internet Security -- Intrusion-Tolerant System Design for Web Server Survivability -- PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access -- An Automatic Security Evaluation System for IPv6 Network -- Secure Software, Hardware, and Systems I -- A Location Privacy Protection Mechanism for Smart Space -- Secure System Architecture Based on Dynamic Resource Reallocation -- Fair Exchange with Guardian Angels -- Secure Software, Hardware, and Systems II -- Sign-Based Differential Power Analysis -- Asymmetric Watermarking Scheme Using Permutation Braids -- Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2 m ) -- E-commerce Security -- Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction -- Multi-dimensional Hash Chain For Sealed-Bid Auction -- An Improved Forward Integrity Protocol for Mobile Agents -- Digital Rights Management -- Taming “Trusted Platforms” by Operating System Design -- A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation -- Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes -- Biometrics and Human Interfaces I -- 3D Face Recognition under Pose Varying Environments -- An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint -- Fingerprint-Based Authentication for USB Token Systems -- Biometrics and Human Interfaces II -- Iris Recognition System Using Wavelet Packet and Support Vector Machines -- Biometrics Identification and Verification Using Projection-Based Face Recognition System -- Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification -- Public Key Cryptography / Key Management -- E-MHT. An Efficient Protocol for Certificate Status Checking -- A Comment on Group Independent Threshold Sharing -- Automation-Considered Logic of Authentication and Key Distribution -- Applied Cryptography -- The MESH Block Ciphers -- Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves -- Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer
- Dimensions
- unknown
- Extent
- XII, 512 p.
- File format
- multiple file formats
- Form of item
- electronic
- Isbn
- 9783540245919
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
- c
- Other control number
- 10.1007/b95188
- Other physical details
- online resource.
- Quality assurance targets
- absent
- Record ID
- 992079059001161
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (DE-He213)978-3-540-24591-9
Context
Context of Information Security Applications : 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers, edited by Ki-Joon Chae, Moti Yung, (electronic resource)Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/-SlFJAQorCc/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/-SlFJAQorCc/">Information Security Applications : 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers, edited by Ki-Joon Chae, Moti Yung, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Instance Information Security Applications : 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers, edited by Ki-Joon Chae, Moti Yung, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/-SlFJAQorCc/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/-SlFJAQorCc/">Information Security Applications : 4th International Workshop, WISA 2003 Jeju Island, Korea, August 25-27, 2003 Revised Papers, edited by Ki-Joon Chae, Moti Yung, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>