Information Security Practice and Experience

5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings

  • Feng Bao
  • Hui Li
  • Guilin Wang
Conference proceedings ISPEC 2009

DOI: 10.1007/978-3-642-00843-6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5451)

Table of contents (34 papers)

  1. Front Matter
  2. Public Key Encryption

    1. Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes
      Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker
      Pages 1-12
    2. A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
      Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi
      Pages 13-23
    3. RSA-Based Certificateless Public Key Encryption
      Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou
      Pages 24-34
  3. Digital Signatures

  4. System Security

    1. An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems
      Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Farley, Xuxian Jiang
      Pages 59-70
    2. Reconstructing a Packed DLL Binary for Static Analysis
      Xianggen Wang, Dengguo Feng, Purui Su
      Pages 71-82
    3. Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework
      Xinsong Wu, Zhouyi Zhou, Yeping He, Hongliang Liang
      Pages 83-92
  5. Applied Cryptography

    1. Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge
      Guifang Huang, Dongdai Lin, Yanshuo Zhang
      Pages 93-101
    2. Certificateless Hybrid Signcryption
      Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
      Pages 112-123
    3. On Non-representable Secret Sharing Matroids
      Qi Cheng, Yong Yin, Kun Xiao, Ching-Fang Hsu
      Pages 124-135
  6. Multimedia Security and DRM

    1. Defending against the Pirate Evolution Attack
      Hongxia Jin, Jeffrey Lotspiech
      Pages 147-158
    2. Security Specification for Conversion Technologies of Heterogeneous DRM Systems
      Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won
      Pages 159-170
  7. Security Protocols

    1. Analysing Protocol Implementations
      Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister, Arne-Kristian Groven
      Pages 171-182
    2. Measuring Anonymity
      Xiaojuan Cai, Yonggen Gu
      Pages 183-194
    3. A Hybrid E-Voting Scheme
      Kun Peng
      Pages 195-206
  8. Key Exchange and Management

About these proceedings


This book constitutes the refereed proceedings of the 5th International Information Security Practice and Experience Conference, ISPEC 2009, held in Xi'an, China in April 2009.

The 34 revised full papers were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on public key encryption, digital signatures, system security, applied cryptography, multimedia security and DRM, security protocols, key exchange and management, hash functions and MACs, cryptanalysis, network security as well as security applications.


Information RFID RSA Trusted Computing VoIP access control anonymity e-Voting intrusion detection networks pairing particle swarm privacy security trust

Editors and affiliations

  • Feng Bao
    • 1
  • Hui Li
    • 2
  • Guilin Wang
    • 3
  1. 1.Institute for Infocomm Research (I<Superscript>2</Superscript>R) 1South TowerSingapore
  2. 2.School of Telecommunications EngineeringXidian UniversityXi’an, ShaanxiP. R. China
  3. 3.School of Computer ScienceUniversity of Birmingham Homepage:

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-00842-9
  • Online ISBN 978-3-642-00843-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349