Information Security Practice and Experience

9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings

  • Robert H. Deng
  • Tao Feng
Conference proceedings ISPEC 2013

DOI: 10.1007/978-3-642-38033-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7863)

Table of contents (27 papers)

  1. Front Matter
  2. Network Security

    1. Trusted Identity Management for Overlay Networks
      Stefan Kraxberger, Ronald Toegl, Martin Pirker, Elisa Pintado Guijarro, Guillermo Garcia Millan
      Pages 16-30
    2. Situational Awareness for Improving Network Resilience Management
      Mixia Liu, Tao Feng, Paul Smith, David Hutchison
      Pages 31-43
    3. Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model
      Yuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen, Yingjun Zhang
      Pages 44-59
  3. Identity-Based Cryptography

    1. Attribute Specified Identity-Based Encryption
      Hao Xiong, Tsz Hon Yuen, Cong Zhang, Yi-Jun He, Siu Ming Yiu
      Pages 60-74
    2. Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions
      Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu
      Pages 75-90
    3. Identity-Based Multisignature with Message Recovery
      Kefeng Wang, Yi Mu, Willy Susilo
      Pages 91-104
    4. Improving the Message-Ciphertext Rate of Lewko’s Fully Secure IBE Scheme
      Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei
      Pages 105-116
  4. Cryptographic Primitives

    1. Accountable Trapdoor Sanitizable Signatures
      Junzuo Lai, Xuhua Ding, Yongdong Wu
      Pages 117-131
    2. A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release
      Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang
      Pages 132-146
    3. About Hash into Montgomery Form Elliptic Curves
      Wei Yu, Kunpeng Wang, Bao Li, Song Tian
      Pages 147-159
    4. Joint Triple-Base Number System for Multi-Scalar Multiplication
      Wei Yu, Kunpeng Wang, Bao Li, Song Tian
      Pages 160-173
  5. Security Protocols

    1. Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks
      Divyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg
      Pages 174-188
    2. Secure RFID Ownership Transfer Protocols
      Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan
      Pages 189-203
    3. Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model
      Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong
      Pages 204-217
    4. Simplified PACE|AA Protocol
      Lucjan Hanzlik, Łukasz Krzywiecki, Mirosław Kutyłowski
      Pages 218-232
  6. System Security

    1. Efficient Attack Detection Based on a Compressed Model
      Shichao Jin, Okhee Kim, Tieming Chen
      Pages 248-262
    2. A Digital Forensic Framework for Automated User Activity Reconstruction
      Jungin Kang, Sangwook Lee, Heejo Lee
      Pages 263-277

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks.

Keywords

attack detection authentication authorisation encryption sanitizable signatures

Editors and affiliations

  • Robert H. Deng
    • 1
  • Tao Feng
    • 2
  1. 1.School of Information SystemsSingapore Management UniversitySingaporeSingapore
  2. 2.School of Computer and CommunicationUniversity of technologyLanzhouChina

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38032-7
  • Online ISBN 978-3-642-38033-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349