Advertisement

Information Security

17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings

  • Sherman S. M. Chow
  • Jan Camenisch
  • Lucas C. K. Hui
  • Siu Ming Yiu
Conference proceedings ISC 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8783)

Table of contents

  1. Front Matter
  2. Public-Key Encryption

    1. Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
      Pages 1-18
    2. Xianhui Lu, Bao Li, Dingding Jia
      Pages 19-32
  3. Authentication

    1. Li Xi, Jianxiong Shao, Kang Yang, Dengguo Feng
      Pages 33-53
    2. Fei Tang, Hongda Li, Bei Liang
      Pages 54-71
  4. Symmetric Key Cryptography

  5. Zero-Knowledge Proofs and Arguments

  6. Outsourced and Multi-party Computations

  7. Implementation

    1. Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao
      Pages 198-215
  8. Information Leakage

    1. Michele Boreale, Michela Paolini
      Pages 216-236
    2. Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, Raheem Beyah
      Pages 237-254
  9. Firewall and Forensics

    1. Yingxin Cheng, Xiao Fu, Bin Luo, Rui Yang, Hao Ruan
      Pages 255-272
    2. Sebastian Biedermann, Jakub Szefer
      Pages 273-290
  10. Web Security

    1. Nick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, Wouter Joosen
      Pages 291-308
    2. Martin Stopczynski, Michael Zugelder
      Pages 309-327
  11. Android Security

    1. Britton Wolfe, Karim O. Elish, Danfeng (Daphne) Yao
      Pages 328-344
    2. Daoyuan Wu, Rocky K. C. Chang
      Pages 345-363
  12. Short Papers

    1. Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng
      Pages 364-376
    2. Aggelos Kiayias, Murat Osmanoglu, Qiang Tang
      Pages 377-387
    3. Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
      Pages 388-400
    4. Duane C. Wilson, Giuseppe Ateniese
      Pages 401-412
    5. Christopher Jämthagen, Linus Karlsson, Paul Stankovski, Martin Hell
      Pages 413-424
    6. Donald Ray, Jay Ligatti
      Pages 425-441
    7. Martin Salfer, Hendrik Schweppe, Claudia Eckert
      Pages 442-453
    8. Yichen Wei, Fei Xu, Xiaojun Chen, Yiguo Pu, Jinqiao Shi, Sihan Qing
      Pages 454-464
    9. Sharath Hiremagalore, Daniel Barbará, Dan Fleck, Walter Powell, Angelos Stavrou
      Pages 477-489
    10. Pinghai Yuan, Qingkai Zeng, Yao Liu
      Pages 490-501
    11. Wanpeng Li, Chris J. Mitchell
      Pages 529-541
    12. Javier González, Michael Hölzl, Peter Riedl, Philippe Bonnet, René Mayrhofer
      Pages 542-554
    13. Xingjie Yu, Bo Chen, Zhan Wang, Bing Chang, Wen Tao Zhu, Jiwu Jing
      Pages 555-567
  13. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014.
The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.

Keywords

access control accountability anonymity and pseudonymity applied cryptography authentication biometrics computer forensics cryptographic protocols data protection data/system integrity database security digital right management economics of security and privacy electronic frauds formal methods in security identity management information dissemination control information hiding and watermarking intrusion detection network security

Editors and affiliations

  • Sherman S. M. Chow
    • 1
  • Jan Camenisch
    • 2
  • Lucas C. K. Hui
    • 3
  • Siu Ming Yiu
    • 3
  1. 1.Department of Information EngineeringChinese University of Hong KongSha TinHong Kong, China
  2. 2.IBM Research ZurichRüschlikonSwitzerland
  3. 3.Department of Computer ScienceThe University of Hong KongHong Kong, China

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-13257-0
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-13256-3
  • Online ISBN 978-3-319-13257-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site