Information Security Applications 6th International Workshop, WISA 2

  • PDF / 7,066,870 Bytes
  • 388 Pages / 430 x 660 pts Page_size
  • 38 Downloads / 187 Views

DOWNLOAD

REPORT


Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos New York University, NY, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

3786

Jooseok Song Taekyoung Kwon Moti Yung (Eds.)

Information Security Applications 6th International Workshop, WISA 2005 Jeju Island, Korea, August 22-24, 2005 Revised Selected Papers

13

Volume Editors Jooseok Song Yonsei University Department of Computer Science 134 Shinchon-Dong, Seodaemun-Gu, Seoul, 120-749, Korea E-mail: [email protected] Taekyoung Kwon Sejong University Department of Computer Engineering 98 Gunja-Dong, Kwangjin-Gu, Seoul, 143-747, Korea E-mail: [email protected] Moti Yung RSA Laboratories and Computer Science Department, Columbia University Room 464, S.W. Mudd Building, New York, NY 10027, USA E-mail: [email protected]

Library of Congress Control Number: 2006920030 CR Subject Classification (1998): E.3, D.4.6, F.2.1, C.2, J.1, C.3, K.6.5 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN ISBN-10 ISBN-13

0302-9743 3-540-31012-6 Springer Berlin Heidelberg New York 978-3-540-31012-9 Springer Berlin Heidelberg New York

This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com © Springer-Verlag Berlin Heidelberg 2006 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 11604938 06/3142 543210

Preface

The 6th International Workshop on Information Security Applications (WISA 2005) was held on Jeju Island, Korea, during August 22–24, 2005. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is t