ISC: International Information Security Conference

Information Security

18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings

  • Javier Lopez
  • Chris J. Mitchell
Conference proceedings ISC 2015

DOI: 10.1007/978-3-319-23318-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9290)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Cryptography I: Signatures

    1. Front Matter
      Pages 1-1
    2. Fuqun Wang, Kunpeng Wang, Bao Li, Yuanyuan Gao
      Pages 42-60
    3. Aggelos Kiayias, Murat Osmanoglu, Qiang Tang
      Pages 61-80
  3. System and Software Security

    1. Front Matter
      Pages 81-81
    2. Lotfi ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim D. Brucker, Philip Miseldine
      Pages 102-119
    3. Martin Gilje Jaatun, Daniela S. Cruzes, Karin Bernsmed, Inger Anne Tøndel, Lillian Røstad
      Pages 120-138
  4. Cryptanalysis I: Block Ciphers

    1. Front Matter
      Pages 139-139
    2. Siwei Sun, Lei Hu, Meiqin Wang, Qianqian Yang, Kexin Qiao, Xiaoshuang Ma et al.
      Pages 141-157
    3. Yuan Yao, Bin Zhang, Wenling Wu
      Pages 158-176
  5. Cryptography II: Protocols

    1. Front Matter
      Pages 189-189
    2. Franziskus Kiefer, Mark Manulis
      Pages 191-208
    3. Gerard Draper-Gil, Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos, Jianying Zhou
      Pages 227-243
    4. Jean Lancrenon, Marjan Škrobot
      Pages 244-261
  6. Network and Cloud Security

    1. Front Matter
      Pages 263-263

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.    

Keywords

Applied cryptography Biometrics Hash function Intrusion detection Network security Access control Anonymity Authentication Cryptanalysis Cryptographic protocols Distributed key generation Formal methods Privacy secure software security side channels stream cipher symmetric encryption watermarking Web security

Editors and affiliations

  • Javier Lopez
    • 1
  • Chris J. Mitchell
    • 2
  1. 1.University of MalagaMalagaSpain
  2. 2.Royal Holloway University of LondonEghamUnited Kingdom

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-23317-8
  • Online ISBN 978-3-319-23318-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349