Down

advertisement
List of Papers Accepted for Full Presentation Track of WISA 2004
1. Impacts of Security Protocols on Real-time Multimedia Communications, Kihun Hong, Soongsil
University, Korea, Luigi Lo Iacono, University of Siegen, Germany, Souhwan Jung, Soongsil
University, Korea, and Christoph Ruland, University of Siegen, Germany.
2. An Improvement on Privacy and Authentication in GSM, Young Jae Choi and Soon Ja Kim,
Kyungpook National University, Korea.
3. Encrypted Watermarks and Linux Laptop Security, Markku-Juhani O.Saarinen, Helsinki
University of Technology, Finland.
4. Inconsistency Detection of Authorization Policies in Distributed Component Environment ,
Chang-Joo Moon and Hoh In, Korea University, Korea.
5. Public key encryption with conjunctive field keyword search, Dong Jin Park, Kihyun Kim and Pil
Joong Lee, POSTECH, Korea.
6. Custodian-Hiding Verifiable Encryption, Joseph K. Liu, Victor K. Wei, The Chinese University of
Hong Kong, and Duncan S. Wong, City University of Hong Kong, Hong Kong.
7. Proving key usage, Malek Bechlaghem and Vincent Rijmen, Cryptomathic NV, Belgium.
8. A Probabilistic Method for Detecting Anomalous Program Behavior, Kohei Tatara, Toshihiro
Tabata and Kouichi Sakura, Kyushu University, Japan.
9. Service Discrimination and Audit File Reduction for effective intrusion detection, Fernando
Godinez, ITESM-Monterrey, Mexico, Dieter Hutter, Saarbrucken University, Germany, and Raul
Monroy, ITESM--Estado de Mexico, Mexico.
10. IDS False Alarm Filtering Using KNN Classifier, Kwok Ho Law and Lam For Kwok, City
University of Hong Kong, Hong Kong.
11. Content-based synchronization using the local invariant feature for robust watermarking, HaeYeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, KAIST, and Yong-Ho Suh, ETRI, Korea.
12. A New Geometric-Transformation Robust and Practical Embedding Scheme for Watermarking
2D Vector Maps in the Graph Spectral Domain, Shangping Zhong, Yue Hu and Jianming Lu,
Chinese Academy of Sciences, China.
13. Some fitting of naive Bayesian spam filtering for Japanese environment, Manabu Iwanaga,
Toshihiro Tabata and Kouichi Sakurai, Kyushu University, Japan.
14. Efficient Authenticated Key Agreement Protocol for Dynamic Groups, Kui Ren, Hyunrok Lee,
Kwangjo Kim, Information and Communications University, Korea, Robert H. Deng, Institute for
Infocomm Research, Singapore, and Taewhan Yoo, ETRI, Korea.
15. A Ring Signature Scheme Using Bilinear Pairings, Jing Xu, Zhen-Feng and Dengguo Feng,
Chinese Academy of Sciences, China.
16. Verifiable Pairing and its Applications, Sherman S.M.Chow, University of Hong Kong, Hong
Kong.
17. Improving the Performance of Signature-based Network Intrusion Detection Sensors by Multithreading, Bart Haagdorens, Vrije Universiteit, Tim Vermeiren, Alcatel R&I, and Marnix
Goossens, Vrije Universiteit, Belgium.
18. An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale
Networks, Seok Bong Jeong, Young Woo Choi and Sehun Kim, KAIST, Korea.
19. Application of Content Computing Infrastructure in Honeyfarm Design, Yiyuan Huang, KwokYan Lam, Tsinghua University, China, Siu-Leung Chung, Open University of Hong Kong, Hong
Kong, Chi-Hung Chi, National University of Singapore, Singapore, and Jia-Guang Sun, Tsinghua
University, China..
20. License Protection with a Tamper-Resistant Token, Cheun Ngen Chong, Bin Ren, Jeroen Doumen,
Sandro Etalle, Pieter Hartel and Ricardo Corin, University of Twente, The Netherlands.
21. An Adaptive Approach to Hardware Alteration for Digital Rights Management, Yinyan Yu and Zhi
Tang, Peking University, China.
22. Dynamic Fingerprinting over Broadcast Using Revocation Scheme, Mira Kim, Institute of
Information Security, Kazukuni Kobara and Hideki Imai, University of Tokyo, Japan.
23. Practical Pay-TV Scheme using Traitor Tracing Scheme for Multiple channels, Chong Hee Kim,
Samsung Electronics, Yong Ho Hwang and Pil Joong Lee, POSTECH, Korea.
24. Vulnerability of a Mobile Payment System proposed at WISA 2002, Sang Cheol Hwang,
Choongnam National University, Dong Hoon Lee, Daewan Han, National Security Research
Institute, and Jae-Cheol Ryou, Choongnam National University, Korea.
25. Fair Offline Payment Using Verifiable Encryption, Sangjin Kim, Korea University of Technology
and Education, and Heekuck Oh, Hanyang University, Korea.
26. A Limited-Used Key Generation Scheme for Internet Transactions, Supakorn Kungpisdan, Phu
Dung Le and Bala Srinivasan, Monash University, Australia.
27. Side Channel Cryptanalysis on SEED, Hyungso Yoo, Changkyun Kim, Kyungpook National
University, Jaecheol Ha, Korea Nazarene University, Sangjae Moon, Kyungpook National
University, and Ilhwan Park, National Security Research Institute, Korea.
28. Secure and Efficient AES Software Implementation for Smart Cards, E.Trichina, Samsung
Electronics, Korea, and L.Korkishko, Ternopol Academy of National Economy, Ukraine.
29. Practical Template Attacks, Christian Rechberger, A-SIT Secure Information Technology Center,
and Elisabeth Oswald, Graz University of Technology, Austria.
30. Evaluation and Improvement of the Tempest fonts, Hidema Tanaka, Osamu Takizawa and Akihiro
Yamamura, National Institute of Information and Communications Technology(NIICT), Japan.
31. Key-Exchange Protocol Using Pre-Agreed Session-ID, Kenji Imamoto and Kouichi Sakurai,
Kyushu University, Japan.
32. A New k-Anonymous Message Transmission Protocol, Yao Gang and Feng Dengguo, Chinese
Academy of Sciences, China.
33. Onions Based on Universal Re-Encryption - Anonymous Communication Immune Against
Repetitive Attack, Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski, Wroclaw
University of Technology, Poland.
34. Hyperelliptic Curve Coprocessors on a FPGA, HoWon Kim, Thomas Wollinger, Ruhr
University Bochum, Germany, YongJe Choi, Kyoil Chung, ETRI, Korea, and Christof Paar, Ruhr
University Bochum, Germany.
35. Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors,
Masanobu Katagi, Izuru Kitamura, Toru Akishita, Sony Corp., Japan, and Tsuyoshi Takagi,
Technische Universitaet Darmstadt, Germany.
36. Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation
in GF(q^n) Using a Gaussian Normal Basis of Type II, Soonhak Kwon, Sungkyunkwan
University, Korea.
37. Efficient Software Implementation of Resilient Maiorana-McFarland S-Boxes, Kishan Chand
Gupta and Palash Sarkar, Indian Statistical Institute, India.
Download