Advertisement

Information Security

16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings

  • Yvo Desmedt

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7807)

Also part of the Security and Cryptology book sub series (LNSC, volume 7807)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Security of Operating Systems

    1. Front Matter
      Pages 1-1
    2. Irfan Ahmed, Golden G. Richard III, Aleksandar Zoranic, Vassil Roussev
      Pages 3-19
    3. Steffen Wagner, Christoph Krauß, Claudia Eckert
      Pages 20-36
  3. Secret Sharing

    1. Front Matter
      Pages 37-37
    2. Teng Guo, Feng Liu, ChuanKun Wu, YoungChang Hou, YaWei Ren, Wen Wang
      Pages 39-48
    3. Stephen R. Tate, Roopa Vishwanathan, Scott Weeks
      Pages 49-65
  4. Encryption

    1. Front Matter
      Pages 67-67
    2. Takashi Kitagawa, Hiroki Kojima, Nuttapong Attrapadung, Hideki Imai
      Pages 87-99
    3. Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro
      Pages 100-109
  5. Malware and Critical Infrastructures

    1. Front Matter
      Pages 111-111
    2. Marián Kühnel, Ulrike Meyer
      Pages 113-129
    3. Byungho Min, Vijay Varadharajan
      Pages 130-139
    4. Cristina Alcaraz, Estefanía Etchevés Miciolino, Stephen Wolthusen
      Pages 140-151
  6. Cryptanalysis

    1. Front Matter
      Pages 153-153
    2. Dongxia Bai, Hongbo Yu
      Pages 155-168
    3. Routo Terada, Reynaldo Cáceres Villena
      Pages 185-196
  7. Block Ciphers and Stream Ciphers

    1. Front Matter
      Pages 197-197
    2. Roberto Avanzi, Billy Bob Brumley
      Pages 199-208
    3. Alberto F. Martínez-Herrera, Carlos Mex-Perera, Juan Nolazco-Flores
      Pages 209-217
  8. Entity Authentication

    1. Front Matter
      Pages 219-219
    2. Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng, Jianying Zhou
      Pages 238-247
    3. Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
      Pages 248-258
  9. Usability and Risk Perception

    1. Front Matter
      Pages 259-259
    2. Niharika Sachdeva, Nitesh Saxena, Ponnurangam Kumaraguru
      Pages 261-279
    3. Vaibhav Garg, L. Jean Camp
      Pages 280-289
  10. Access Control

    1. Front Matter
      Pages 291-291
    2. Yanjiang Yang, Xuhua Ding, Haibing Lu, Zhiguo Wan, Jianying Zhou
      Pages 293-308
    3. Xing Jin, Lusha Wang, Tongbo Luo, Wenliang Du
      Pages 309-318
  11. Computer Security

    1. Front Matter
      Pages 319-319
    2. Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz
      Pages 321-337
  12. Privacy Attacks

    1. Front Matter
      Pages 339-339
    2. Sarker T. Ahmed Rumee, Donggang Liu
      Pages 341-353
    3. Ping Chen, Nick Nikiforakis, Christophe Huygens, Lieven Desmet
      Pages 354-363
  13. Cryptography

    1. Front Matter
      Pages 365-365
    2. Naoto Yanai, Masahiro Mambo, Eiji Okamoto
      Pages 367-377
    3. Mohsen Alimomeni, Reihaneh Safavi-Naini
      Pages 378-390
    4. Matheus F. de Oliveira, Marco Aurélio Amaral Henriques
      Pages 407-416
  14. Back Matter
    Pages 417-418

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security, ISC 2013, held in Dallas, Texas, in November 2013.

The 16 revised full papers presented together with 14 short papers were carefully reviewed and selected from 70 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: security of operating systems; secret sharing; encryption; malware and Critical infrastructures; cryptanalysis; block ciphers and stream ciphers; entity authentication; usability & risk perception; access control; computer security; privacy attacks; cryptography.

Keywords

cryptanalysis cyber-physical system elliptic curves malware universal hash functions algebraic attack block cipher CAPTCHA cold boot attack complex networks facebook meet-in-the-middle attack pairing password authentication privacy RSA cryptosystem side-channel attacks smart card stream cipher visual cryptography

Editors and affiliations

  • Yvo Desmedt
    • 1
  1. 1.University of Texas at DallasRichardsonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-27659-5
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-27658-8
  • Online ISBN 978-3-319-27659-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site