skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Information security applications : 7th international workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006 : revised selected papers Preview this item
ClosePreview this item
Checking...

Information security applications : 7th international workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006 : revised selected papers

Author: Jae-Kwang Lee; Okyeon Yi; Moti Yung
Publisher: Berlin ; New York : Springer, ©2007.
Series: Lecture notes in computer science, 4298.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   Print book : Conference publication : EnglishView all editions and formats
Summary:

This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Conference papers and proceedings
Congresses
Material Type: Conference publication, Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Jae-Kwang Lee; Okyeon Yi; Moti Yung
ISBN: 9783540710929 3540710922
OCLC Number: 122935511
Description: xiv, 406 pages : illustrations ; 24 cm
Contents: Public Key Crypto Applications/Virus Protection.- Controllable Ring Signatures.- Efficient User Authentication and Key Agreement in Wireless Sensor Networks.- Identity-Based Key Issuing Without Secure Channel in a Broad Area.- PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution.- Cyber Indication/Intrusion Detection.- SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks.- SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment.- sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm.- Biometrics/Security Trust Management.- Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.- Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification.- Quality Assurance for Evidence Collection in Network Forensics.- Secure Software/Systems.- Visualization of Permission Checks in Java Using Static Analysis.- Deployment of Virtual Machines in Lock-Keeper.- Smart Cards/Secure Hardware.- Investigations of Power Analysis Attacks and Countermeasures for ARIA.- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols.- A Novel Key Agreement Scheme in a Multiple Server Environment.- Mobile Security.- Cost-Effective IDS Operating Scheme in MANETs.- Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6.- A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones.- DRM/Information Hiding/Ubiquitous Computing Security/P2P Security.- Distributed Management of OMA DRM Domains.- New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting.- A Key Management Based on Multiple Regression in Hierarchical Sensor Network.- Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks.- Privacy/Anonymity.- Privacy Protection in PKIs: A Separation-of-Authority Approach.- Three-Party Password Authenticated Key Agreement Resistant to Server Compromise.- Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature.- Secret Handshake with Multiple Groups.- Internet and Wireless Security.- Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs.- EAP Using the Split Password-Based Authenticated Key Agreement.- How Many Malicious Scanners Are in the Internet?.- E-Passport: The Global Traceability Or How to Feel Like a UPS Package.
Series Title: Lecture notes in computer science, 4298.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: WISA 2006
Responsibility: Jae-Kwang Lee, Okyeon Yi, Moti Yung (eds.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/122935511<\/a>> # Information security applications : 7th international workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006 : revised selected papers<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"122935511<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/dbpedia.org\/resource\/New_York_City<\/a>> ; # New York<\/span>\n\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Place\/berlin<\/a>> ; # Berlin<\/span>\n\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/gw<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Topic\/informatique<\/a>> ; # Informatique<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Topic\/computer_security_international_cooperation<\/a>> ; # Computer security--International cooperation<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e22\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Topic\/data_protection_international_cooperation<\/a>> ; # Data protection--International cooperation<\/span>\n\u00A0\u00A0\u00A0\nschema:alternateName<\/a> \"WISA 2006<\/span>\" ;\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/viaf.org\/viaf\/272387770<\/a>> ; # Okyeon Yi<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/viaf.org\/viaf\/50403438<\/a>> ; # Jae-Kwang Lee<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/viaf.org\/viaf\/12562641<\/a>> ; # Moti Yung<\/span>\n\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2007<\/span>\" ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Meeting\/wisa_workshop_information_security_7th_2006_cheju_do_korea<\/a>> ; # WISA (Workshop : Information security) (7th : 2006 : Cheju-do, Korea)<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2007<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/4202859142<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Conference publication<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Conference papers and proceedings<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/worldcat.org\/issn\/0302-9743<\/a>> ; # Lecture notes in computer science ;<\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Series\/lncs_sublibrary<\/a>> ; # LNCS sublibrary.<\/span>\n\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Series\/lncs_sublibrary_sl_4_security_and_cryptology<\/a>> ; # LNCS sublibrary. SL 4, Security and cryptology<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Information security applications : 7th international workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006 : revised selected papers<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"122935511<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/122935511#PublicationEvent\/berlin_new_york_springer_2007<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Agent\/springer<\/a>> ; # Springer<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/catdir.loc.gov\/catdir\/toc\/fy0714\/2007922329.html<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/www.springerlink.com\/openurl.asp?genre=issue&issn=0302-9743&volume=4298<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/link.springer-ny.com\/link\/service\/series\/0558\/tocs\/t4298.htm<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/doi.org\/10.1007\/978-3-540-71093-6<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9783540710929<\/a>> ;\u00A0\u00A0\u00A0\numbel:isLike<\/a> <http:\/\/d-nb.info\/983130175<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/122935511<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dbpedia.org\/resource\/New_York_City<\/a>> # New York<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"New York<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/dewey.info\/class\/005.8\/e22\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Agent\/springer<\/a>> # Springer<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Springer<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Meeting\/wisa_workshop_information_security_7th_2006_cheju_do_korea<\/a>> # WISA (Workshop : Information security) (7th : 2006 : Cheju-do, Korea)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Meeting<\/a>, schema:Event<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Place\/cheju_do_korea<\/a>> ; # Cheju-do, Korea)<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"WISA (Workshop : Information security) (7th : 2006 : Cheju-do, Korea)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Place\/berlin<\/a>> # Berlin<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Berlin<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Place\/cheju_do_korea<\/a>> # Cheju-do, Korea)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cheju-do, Korea)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Series\/lncs_sublibrary<\/a>> # LNCS sublibrary.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/122935511<\/a>> ; # Information security applications : 7th international workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006 : revised selected papers<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"LNCS sublibrary.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Series\/lncs_sublibrary_sl_4_security_and_cryptology<\/a>> # LNCS sublibrary. SL 4, Security and cryptology<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/122935511<\/a>> ; # Information security applications : 7th international workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006 : revised selected papers<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"LNCS sublibrary. SL 4, Security and cryptology<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Topic\/computer_security_international_cooperation<\/a>> # Computer security--International cooperation<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh90001862<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security--International cooperation<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Topic\/data_protection_international_cooperation<\/a>> # Data protection--International cooperation<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh85035859<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Data protection--International cooperation<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Topic\/informatique<\/a>> # Informatique<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Informatique<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/gw<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"gw<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/12562641<\/a>> # Moti Yung<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Yung<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Moti<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Moti Yung<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/272387770<\/a>> # Okyeon Yi<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Yi<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Okyeon<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Okyeon Yi<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/50403438<\/a>> # Jae-Kwang Lee<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Lee<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Jae-Kwang<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Jae-Kwang Lee<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9783540710929<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"3540710922<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9783540710929<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/issn\/0302-9743<\/a>> # Lecture notes in computer science ;<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/122935511<\/a>> ; # Information security applications : 7th international workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006 : revised selected papers<\/span>\n\u00A0\u00A0\u00A0\nschema:issn<\/a> \"0302-9743<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Lecture notes in computer science ;<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Lecture notes in computer science,<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.springerlink.com\/openurl.asp?genre=issue&issn=0302-9743&volume=4298<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"(access limited to Benedictine University patrons)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/122935511<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/122935511<\/a>> ; # Information security applications : 7th international workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006 : revised selected papers<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2019-06-05<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/122935511#PublicationEvent\/berlin_new_york_springer_2007<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/dbpedia.org\/resource\/New_York_City<\/a>> ; # New York<\/span>\n\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Place\/berlin<\/a>> ; # Berlin<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/4202859142#Agent\/springer<\/a>> ; # Springer<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n