Information Security

17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings

  • Sherman S. M. Chow
  • Jan Camenisch
  • Lucas C. K. Hui
  • Siu Ming Yiu
Conference proceedings ISC 2014

DOI: 10.1007/978-3-319-13257-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8783)

Table of contents

  1. Front Matter
  2. Public-Key Encryption

    1. Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
      Pages 1-18
    2. Xianhui Lu, Bao Li, Dingding Jia
      Pages 19-32
  3. Authentication

    1. Li Xi, Jianxiong Shao, Kang Yang, Dengguo Feng
      Pages 33-53
    2. Fei Tang, Hongda Li, Bei Liang
      Pages 54-71
  4. Symmetric Key Cryptography

  5. Zero-Knowledge Proofs and Arguments

  6. Outsourced and Multi-party Computations

  7. Implementation

    1. Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao
      Pages 198-215
  8. Information Leakage

    1. Michele Boreale, Michela Paolini
      Pages 216-236
    2. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, Raheem Beyah
      Pages 237-254
  9. Firewall and Forensics

    1. Yingxin Cheng, Xiao Fu, Bin Luo, Rui Yang, Hao Ruan
      Pages 255-272
    2. Sebastian Biedermann, Jakub Szefer
      Pages 273-290
  10. Web Security

    1. Nick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, Wouter Joosen
      Pages 291-308
    2. Martin Stopczynski, Michael Zugelder
      Pages 309-327
  11. Android Security

    1. Britton Wolfe, Karim O. Elish, Danfeng (Daphne) Yao
      Pages 328-344

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.

Keywords

access control accountability anonymity and pseudonymity applied cryptography authentication biometrics computer forensics cryptographic protocols data protection data/system integrity database security digital right management economics of security and privacy electronic frauds formal methods in security identity management information dissemination control information hiding and watermarking intrusion detection network security

Editors and affiliations

  • Sherman S. M. Chow
    • 1
  • Jan Camenisch
    • 2
  • Lucas C. K. Hui
    • 3
  • Siu Ming Yiu
    • 3
  1. 1.Department of Information EngineeringChinese University of Hong KongSha TinHong Kong, China
  2. 2.IBM Research ZurichRüschlikonSwitzerland
  3. 3.Department of Computer ScienceThe University of Hong KongHong Kong, China

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-13256-3
  • Online ISBN 978-3-319-13257-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349