Sciweavers

WISA
2004
Springer
14 years 5 months ago
Inconsistency Detection of Authorization Policies in Distributed Component Environment
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
Chang-Joo Moon, Hoh Peter In
WISA
2004
Springer
14 years 5 months ago
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking
This paper addresses the problem of content-based synchronization for robust watermarking. Synchronization is a process of extracting the location to embed and detect the signature...
Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, Young-...
WISA
2004
Springer
14 years 5 months ago
Hyperelliptic Curve Coprocessors on a FPGA
Abstract. Cryptographic algorithms are used in a large variety of different applications to ensure security services. It is, thus, very interesting to investigate various implement...
Howon Kim, Thomas J. Wollinger, YongJe Choi, Kyoil...
WISA
2004
Springer
14 years 5 months ago
Fair Offline Payment Using Verifiable Encryption
Sangjin Kim, Heekuck Oh
WISA
2004
Springer
14 years 5 months ago
Public Key Encryption with Conjunctive Field Keyword Search
Dong Jin Park, Kihyun Kim, Pil Joong Lee
WISA
2004
Springer
14 years 5 months ago
Vulnerability of a Mobile Payment System Proposed at WISA 2002
SangCheol Hwang, Dong Hoon Lee 0002, Daewan Han, J...
WISA
2004
Springer
14 years 5 months ago
A New k-Anonymous Message Transmission Protocol
Gang Yao, Dengguo Feng
WISA
2004
Springer
14 years 5 months ago
A Ring Signature Scheme Using Bilinear Pairings
Jing Xu, Zhenfeng Zhang, Dengguo Feng
WISA
2004
Springer
14 years 5 months ago
Secure and Efficient AES Software Implementation for Smart Cards
In implementing cryptographic algorithms on limited devices such as smart cards, speed and memory optimization had always been a challenge. With the advent of side channel attacks,...
Elena Trichina, Lesya Korkishko
WISA
2004
Springer
14 years 5 months ago
A Probabilistic Method for Detecting Anomalous Program Behavior
In this paper, we, as well as Eskin, Lee, Stolfo [7] propose a method of prediction model. In their method, the program was characterized with both the order and the kind of system...
Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai