Call for Papers s15

Total Page:16

File Type:pdf, Size:1020Kb

Call for Papers s15

List of Papers Accepted for Short Presentation Track of WISA 2004

1. A Proxy Blind Signature based on a revised LKK, Ryu-Jongho, Shim-HyunJung, Youm- Heungyoul, SoonChunHyang University, and Lee-Jaegeun National Computerization Agency, Korea 2. A Design Approach Towards Interactive Anonymous Verifiable Encryption for Ad Hoc Groups, Joseph K. Liu, Chinese University of Hong Kong, and Duncan S. Wong, City University of Hong Kong, Hong Kong 3. A New Multiplication Technique for GF(2^m) with Cryptographic Significance, Athar Mahboob and Nassar Ikram, National University of Sciences & Technology, Pakistan 4. A New Architecture for Multiplication over Finite Fields GF(2^m) Defined by All-One Polynomials, Yong-Hee Jang and Yong-Jin Kwon, Hankuk Aviation University, Korea 5. A Scalable Architecture for Multiplier over Finite Fields GF(2^m), Kwang-Jin Lee, Yong-Hee Jang and Yong-Jin Kwon, Hankuk Aviation University, Korea 6. Biometric Person Authentication for Access Control Scenario based on Face Recognition, Hyeonjoon Moon and TaeKyung Kwon, Sejong University, Korea 7. N-Secure Fingerprinting for Copyright Protection of Multimedia, Won-gyum Kim and Young Ho Suh, ETRI, Korea 8. A method for the authentication of web documents, Won Bo Shim, Chung Cheong University, and Seok Park, Sogang University, Korea 9. N-Gram-based Dynamic Web Page Defacement Validation, Woonyon Kim, Miri Joo, Eunyung Lee, Dohoon Lee, Eungki Park, National Security Research Institute, and Sangwook Kim, Kyungpook National University, Korea 10. Efficient Image Encryption Based on JPEG2000, Shiguo Lian, Jinsheng Sun and Zhiquan Wang, Nanjing University of Science and Technology, China 11. A Framework for Distributed OCSP without Responder Certificate, Young-Ho Park and Kyung- Hyune Rhee, Pukyong National University, Korea 12. PKI-Based DLC System over Internet, Duhyun Bae, Jiho Kim, Sehyun Park and Ohyoung Song, Chung-Ang University, Korea 13. An e-Lottery Scheme using Verifiable Random Function, Sherman S.M. Chow, Lucas C.K. Hui, S.M. Yiu and K.P. Chow, University of Hong Kong, Hong Kong 14. An Interactive Drama Delivering System Suitable for Mobile Phone, Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida and Toru Fujiwara, Osaka University, Japan 15. The Secure and Multiple Payment System Based on the Mobile Phone Platform, Qing Zhang, J. N. B. Moita, K. Mayes and K. Markantonakis, University of London, UK 16. Revisions to the Spectral Test and the Lempel-Ziv Compression Test in the NIST Statistical Test Suite, Song-Ju Kim, National Institute of Information and Communications Technology, and Ken Umeno, ChaosWare Inc., Japan 17. A Disciplined Security Specification for a High-Assurance Grid, Ning Zhu, Jussipekka Leiwo and Stephen John Turner, Nanyang Technological University, Singapore 18. Three principles for specifying security objectives, Jussipekka Leiwo, Nanyang Technological University, Singapore 19. A Hybrid Approach for Survivability, Khin Mi Mi Aung and Jong Sou Park, Hankuk Aviation University, Korea 20. Coordinated Network Survivability Mechanism in OVPN over IP/GMPLS over DWDM, Kwang Hyun Cho, Jin Ho Hwang, Pukyong National University, Jeong Nyeo Kim, Sang Su Lee, ETRI, and Sung Un Kim, Pukyong National University, Korea 21. mssl: securely sharing data from a server among clients, Jun Li and Xun Kang, University of Oregon, USA 22. Self-Reputation System in P2P Networks, Jung Hee Cheon, Nam Soo Jho, Woo-Hwan Kim, In- Sok Lee and HyoJin Yoon, Seoul National University, Korea 23. A Location-Aware Security Architecture for Ubiquitous Networks, Minsoo Lee, Jintaek Kim, Hyunseok Choi, Sehyun Park and Ohyoung Song, Chung-Ang University, Korea 24. System for Preventing Counterfeiting of Retail Items using RFID tags, Sung Ho Yoo, Yong Ho Hwang and Pil Joong Lee, POSTECH, Korea 25. Use of Sequential Patterns for Intrusion Detection, Abdulrahman Alharby and Hideki Imai, University of Tokyo, Japan 26. Improvement of NID According to Selection of Continuous Measures in Tree Induction Algorithm, Il-Ahn Cheong, Chonnam National University, Yong-Min Kim, Yeosu National University, Minsoo Kim and Bong-Nam Noh, Chonnam National University, Korea 27. Enhancing network intrusion detection system with honeynet, XiaLi Hei, Kwok-Yan Lam and Yiyuan Huang, Tsinghua University, China 28. A Visual RTSD System against Various Attacks for Low False Positive Rate Based on Patterns of Attacker's Behaviors, Joong-Seok Song and Yong-Jin Kwon, Hankuk Aviation University, Korea 29. An analysis on the correlation of network-based alerts with association rule algorithm, Woo-Jin Moh, Minsoo Kim, Il-Ahn Cheong, Bong-Nam Noh, Chonnam National University, Jung-Taek Seo, Eung-Gi Park and Choon-Sik Park, National Security Research Institute, Korea 30. An Approach of Marking Packet at Source Side for IP Traceback, Yu Xiang and Choong Seon Hong, Kyunghee University, Korea, Jeong-Nyeo Kim, ETRI, Korea

Recommended publications