Information Security

16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings

  • Yvo Desmedt

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7807)

Also part of the Security and Cryptology book sub series (LNSC, volume 7807)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Security of Operating Systems

    1. Front Matter
      Pages 1-1
    2. Irfan Ahmed, Golden G. Richard III, Aleksandar Zoranic, Vassil Roussev
      Pages 3-19
    3. Steffen Wagner, Christoph Krauß, Claudia Eckert
      Pages 20-36
  3. Secret Sharing

    1. Front Matter
      Pages 37-37
    2. Teng Guo, Feng Liu, ChuanKun Wu, YoungChang Hou, YaWei Ren, Wen Wang
      Pages 39-48
    3. Stephen R. Tate, Roopa Vishwanathan, Scott Weeks
      Pages 49-65
  4. Encryption

    1. Front Matter
      Pages 67-67
    2. Takashi Kitagawa, Hiroki Kojima, Nuttapong Attrapadung, Hideki Imai
      Pages 87-99
    3. Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro
      Pages 100-109
  5. Malware and Critical Infrastructures

    1. Front Matter
      Pages 111-111
    2. Marián Kühnel, Ulrike Meyer
      Pages 113-129
    3. Byungho Min, Vijay Varadharajan
      Pages 130-139
    4. Cristina Alcaraz, Estefanía Etchevés Miciolino, Stephen Wolthusen
      Pages 140-151
  6. Cryptanalysis

    1. Front Matter
      Pages 153-153
    2. Dongxia Bai, Hongbo Yu
      Pages 155-168
    3. Routo Terada, Reynaldo Cáceres Villena
      Pages 185-196
  7. Block Ciphers and Stream Ciphers

    1. Front Matter
      Pages 197-197

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security, ISC 2013, held in Dallas, Texas, in November 2013.

The 16 revised full papers presented together with 14 short papers were carefully reviewed and selected from 70 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: security of operating systems; secret sharing; encryption; malware and Critical infrastructures; cryptanalysis; block ciphers and stream ciphers; entity authentication; usability & risk perception; access control; computer security; privacy attacks; cryptography.

Keywords

cryptanalysis cyber-physical system elliptic curves malware universal hash functions algebraic attack block cipher CAPTCHA cold boot attack complex networks facebook meet-in-the-middle attack pairing password authentication privacy RSA cryptosystem side-channel attacks smart card stream cipher visual cryptography

Editors and affiliations

  • Yvo Desmedt
    • 1
  1. 1.University of Texas at DallasRichardsonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-27659-5
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-27658-8
  • Online ISBN 978-3-319-27659-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book