List of Papers Accepted for Full Presentation Track of WISA 2004 1. Impacts of Security Protocols on Real-time Multimedia Communications, Kihun Hong, Soongsil University, Korea, Luigi Lo Iacono, University of Siegen, Germany, Souhwan Jung, Soongsil University, Korea, and Christoph Ruland, University of Siegen, Germany. 2. An Improvement on Privacy and Authentication in GSM, Young Jae Choi and Soon Ja Kim, Kyungpook National University, Korea. 3. Encrypted Watermarks and Linux Laptop Security, Markku-Juhani O.Saarinen, Helsinki University of Technology, Finland. 4. Inconsistency Detection of Authorization Policies in Distributed Component Environment , Chang-Joo Moon and Hoh In, Korea University, Korea. 5. Public key encryption with conjunctive field keyword search, Dong Jin Park, Kihyun Kim and Pil Joong Lee, POSTECH, Korea. 6. Custodian-Hiding Verifiable Encryption, Joseph K. Liu, Victor K. Wei, The Chinese University of Hong Kong, and Duncan S. Wong, City University of Hong Kong, Hong Kong. 7. Proving key usage, Malek Bechlaghem and Vincent Rijmen, Cryptomathic NV, Belgium. 8. A Probabilistic Method for Detecting Anomalous Program Behavior, Kohei Tatara, Toshihiro Tabata and Kouichi Sakura, Kyushu University, Japan. 9. Service Discrimination and Audit File Reduction for effective intrusion detection, Fernando Godinez, ITESM-Monterrey, Mexico, Dieter Hutter, Saarbrucken University, Germany, and Raul Monroy, ITESM--Estado de Mexico, Mexico. 10. IDS False Alarm Filtering Using KNN Classifier, Kwok Ho Law and Lam For Kwok, City University of Hong Kong, Hong Kong. 11. Content-based synchronization using the local invariant feature for robust watermarking, HaeYeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, KAIST, and Yong-Ho Suh, ETRI, Korea. 12. A New Geometric-Transformation Robust and Practical Embedding Scheme for Watermarking 2D Vector Maps in the Graph Spectral Domain, Shangping Zhong, Yue Hu and Jianming Lu, Chinese Academy of Sciences, China. 13. Some fitting of naive Bayesian spam filtering for Japanese environment, Manabu Iwanaga, Toshihiro Tabata and Kouichi Sakurai, Kyushu University, Japan. 14. Efficient Authenticated Key Agreement Protocol for Dynamic Groups, Kui Ren, Hyunrok Lee, Kwangjo Kim, Information and Communications University, Korea, Robert H. Deng, Institute for Infocomm Research, Singapore, and Taewhan Yoo, ETRI, Korea. 15. A Ring Signature Scheme Using Bilinear Pairings, Jing Xu, Zhen-Feng and Dengguo Feng, Chinese Academy of Sciences, China. 16. Verifiable Pairing and its Applications, Sherman S.M.Chow, University of Hong Kong, Hong Kong. 17. Improving the Performance of Signature-based Network Intrusion Detection Sensors by Multithreading, Bart Haagdorens, Vrije Universiteit, Tim Vermeiren, Alcatel R&I, and Marnix Goossens, Vrije Universiteit, Belgium. 18. An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks, Seok Bong Jeong, Young Woo Choi and Sehun Kim, KAIST, Korea. 19. Application of Content Computing Infrastructure in Honeyfarm Design, Yiyuan Huang, KwokYan Lam, Tsinghua University, China, Siu-Leung Chung, Open University of Hong Kong, Hong Kong, Chi-Hung Chi, National University of Singapore, Singapore, and Jia-Guang Sun, Tsinghua University, China.. 20. License Protection with a Tamper-Resistant Token, Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter Hartel and Ricardo Corin, University of Twente, The Netherlands. 21. An Adaptive Approach to Hardware Alteration for Digital Rights Management, Yinyan Yu and Zhi Tang, Peking University, China. 22. Dynamic Fingerprinting over Broadcast Using Revocation Scheme, Mira Kim, Institute of Information Security, Kazukuni Kobara and Hideki Imai, University of Tokyo, Japan. 23. Practical Pay-TV Scheme using Traitor Tracing Scheme for Multiple channels, Chong Hee Kim, Samsung Electronics, Yong Ho Hwang and Pil Joong Lee, POSTECH, Korea. 24. Vulnerability of a Mobile Payment System proposed at WISA 2002, Sang Cheol Hwang, Choongnam National University, Dong Hoon Lee, Daewan Han, National Security Research Institute, and Jae-Cheol Ryou, Choongnam National University, Korea. 25. Fair Offline Payment Using Verifiable Encryption, Sangjin Kim, Korea University of Technology and Education, and Heekuck Oh, Hanyang University, Korea. 26. A Limited-Used Key Generation Scheme for Internet Transactions, Supakorn Kungpisdan, Phu Dung Le and Bala Srinivasan, Monash University, Australia. 27. Side Channel Cryptanalysis on SEED, Hyungso Yoo, Changkyun Kim, Kyungpook National University, Jaecheol Ha, Korea Nazarene University, Sangjae Moon, Kyungpook National University, and Ilhwan Park, National Security Research Institute, Korea. 28. Secure and Efficient AES Software Implementation for Smart Cards, E.Trichina, Samsung Electronics, Korea, and L.Korkishko, Ternopol Academy of National Economy, Ukraine. 29. Practical Template Attacks, Christian Rechberger, A-SIT Secure Information Technology Center, and Elisabeth Oswald, Graz University of Technology, Austria. 30. Evaluation and Improvement of the Tempest fonts, Hidema Tanaka, Osamu Takizawa and Akihiro Yamamura, National Institute of Information and Communications Technology(NIICT), Japan. 31. Key-Exchange Protocol Using Pre-Agreed Session-ID, Kenji Imamoto and Kouichi Sakurai, Kyushu University, Japan. 32. A New k-Anonymous Message Transmission Protocol, Yao Gang and Feng Dengguo, Chinese Academy of Sciences, China. 33. Onions Based on Universal Re-Encryption - Anonymous Communication Immune Against Repetitive Attack, Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, Wroclaw University of Technology, Poland. 34. Hyperelliptic Curve Coprocessors on a FPGA, HoWon Kim, Thomas Wollinger, Ruhr University Bochum, Germany, YongJe Choi, Kyoil Chung, ETRI, Korea, and Christof Paar, Ruhr University Bochum, Germany. 35. Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors, Masanobu Katagi, Izuru Kitamura, Toru Akishita, Sony Corp., Japan, and Tsuyoshi Takagi, Technische Universitaet Darmstadt, Germany. 36. Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q^n) Using a Gaussian Normal Basis of Type II, Soonhak Kwon, Sungkyunkwan University, Korea. 37. Efficient Software Implementation of Resilient Maiorana-McFarland S-Boxes, Kishan Chand Gupta and Palash Sarkar, Indian Statistical Institute, India.