Information Security

19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings

  • Matt Bishop
  • Anderson C A Nascimento

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9866)

Also part of the Security and Cryptology book sub series (LNSC, volume 9866)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Cryptanalysis

    1. Front Matter
      Pages 1-1
    2. Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef
      Pages 3-17
    3. Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef
      Pages 18-34
    4. Jun Xu, Lei Hu, Xiaona Zhang, Liqiang Peng, Zhangjie Huang
      Pages 48-58
    5. Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai, Na Pang
      Pages 59-72
    6. Tomer Ashur, Bart Mennink
      Pages 73-92
  3. Cryptographic Protocols

    1. Front Matter
      Pages 93-93
    2. Lucjan Hanzlik, Mirosław Kutyłowski
      Pages 115-129
    3. Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng
      Pages 130-146
    4. Franziskus Kiefer, Mark Manulis
      Pages 147-166
  4. Network and Systems Security and Access Control

    1. Front Matter
      Pages 181-181
    2. Gaute Wangen, Andrii Shalaginov, Christoffer Hallstensen
      Pages 183-202
    3. Prosunjit Biswas, Ravi Sandhu, Ram Krishnan
      Pages 218-230
    4. George D. Webster, Zachary D. Hanif, Andre L. P. Ludwig, Tamas K. Lengyel, Apostolis Zarras, Claudia Eckert
      Pages 231-249
  5. Privacy and Watermarking

    1. Front Matter
      Pages 251-251

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016. The 19 revised full papers presented together with 7 short papers were carefully reviewed and selected from 76 submissions. 
The conference focuses on following subjects technical aspects of information security, cryptanalysis, cryptographic protocols, network and systems security and access control, privacy and watermarking, software security, encryption, signatures and fundamentals. 

Keywords

access control authenticated key exchange authentication computer crime cryptanalysis cryptography encryption information security intrusion detection network security passwords privacy public key cryptography security smart cards software security systems security

Editors and affiliations

  • Matt Bishop
    • 1
  • Anderson C A Nascimento
    • 2
  1. 1.University of California DaviesUSA
  2. 2.University of Washington TacomaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-45871-7
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-45870-0
  • Online ISBN 978-3-319-45871-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book