The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27–29, 2007. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We were very pleased and honored to serve as the Program Committee Co-chairs of WISA 2007. The Program Committee received 95 papers from 20 countries, and accepted 27 papers for the full presentation track. The papers were selected after an extensive and careful refereeing process in which each paper was reviewed by at least three members of the Program Committee. In addition to the contributed papers, the workshop had three special talks. Moti Yung gave a tutorial talk, entitled “Somebody You Know: The Fourth Factor of Authentication.” Kihong Park and Nasir Memon gave invited talks, entitled “Reactive Zero-Day Attack Protection” and “Securing Biometric T- plates,” respectively. Many people deserve our gratitude for their generous contributions to the success of the workshop. We would like to thank all the people involved in the technical program and in organizing the workshop. We are very grateful to the ProgramCommitteemembersandtheexternalrefereesfortheir timeande?orts in reviewing the submissions and selecting the accepted papers. We also express our special thanks to the Organizing Committee members for their hard work in organizing the workshop.
Author(s): Masaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto (auth.), Sehun Kim, Moti Yung, Hyung-Woo Lee (eds.)
Series: Lecture Notes in Computer Science 4867 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007
Language: English
Pages: 388
Tags: Data Encryption; Systems and Data Security; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Management of Computing and Information Systems; Special Purpose and Application-Based Systems
Front Matter....Pages -
Universal η T Pairing Algorithm over Arbitrary Extension Degree....Pages 1-15
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction....Pages 16-29
Secret Signatures: How to Achieve Business Privacy Efficiently?....Pages 30-47
Implementation of BioAPI Conformance Test Suite Using BSP Testing Model....Pages 48-60
Information Hiding in Software with Mixed Boolean-Arithmetic Transforms....Pages 61-75
Geometrically Invariant Image Watermarking in the DWT Domain....Pages 76-90
Implementation of LSM-Based RBAC Module for Embedded System....Pages 91-101
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations....Pages 102-114
A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor....Pages 115-127
Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine....Pages 128-141
An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks....Pages 142-156
Detecting Motifs in System Call Sequences....Pages 157-172
Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System....Pages 173-187
Breaking 104 Bit WEP in Less Than 60 Seconds....Pages 188-202
Efficient Implementation of the Pairing on Mobilephones Using BREW....Pages 203-214
Security Analysis of MISTY1....Pages 215-226
A Generic Method for Secure SBox Implementation....Pages 227-244
On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences....Pages 245-265
Authorization Constraints Specification of RBAC....Pages 266-276
Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk....Pages 277-290
A Compositional Multiple Policies Operating System Security Model....Pages 291-302
Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones....Pages 303-316
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures....Pages 317-332
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC....Pages 333-344
Risk & Distortion Based K -Anonymity....Pages 345-358
Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System....Pages 359-370
ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems....Pages 371-386
Back Matter....Pages -