Information Security Practice and Experience

13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings

  • Joseph K. Liu
  • Pierangela Samarati
Conference proceedings ISPEC 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10701)

Also part of the Security and Cryptology book sub series (LNSC, volume 10701)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Blockchain

    1. Front Matter
      Pages 1-1
    2. Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo et al.
      Pages 3-24
    3. Xuan Han, Yamin Liu, Haixia Xu
      Pages 25-42
    4. Haibo Tian, Jiejie He, Liqing Fu
      Pages 43-61
    5. Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen et al.
      Pages 62-81
  3. Asymmetric Encryption

    1. Front Matter
      Pages 83-83
    2. Jinyong Chang, Honglong Dai, Maozhi Xu
      Pages 85-101
    3. Haomiao Yang, Yunfan Huang, Yong Yu, Mingxuan Yao, Xiaosong Zhang
      Pages 102-117
    4. Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, Kaitai Liang
      Pages 118-135
    5. Song Luo, Lu Yan, Jian Weng, Zheng Yang
      Pages 136-155
    6. Bo Lv, Zhiniang Peng, Shaohua Tang
      Pages 156-167
    7. Bo-Yeon Sim, Dong-Guk Han
      Pages 168-185
  4. Symmetric Encryption

    1. Front Matter
      Pages 215-215
    2. Xuan Shen, Ruilin Li, Bing Sun, Lei Cheng, Chao Li, Maodong Liao
      Pages 237-255
  5. Lattice-Based Cryptography

    1. Front Matter
      Pages 277-277

About these proceedings

Introduction

This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017.
The 34 full and 14 short papers presented together with 9 papers from the SocialSec Track in this volume were carefully reviewed and selected from 105 submissions. The papers cover topics such as blockchain, asymmetric encryption, symmetric encryption, lattice-based cryptography, searchable encryption, signature, authentication, cloud security, network security, cyber-physical security, social network and QR code security, software security and trusted computing, and SocialSec track.

Keywords

access control artificial intelligence authentication communications computer crime cryptography data mining data privacy electronic document identification systems encryption internet network security privacy privacy preserving public key encryption public keys (PK) security systems social engineering social networks

Editors and affiliations

  • Joseph K. Liu
    • 1
  • Pierangela Samarati
    • 2
  1. 1.Monash UniversityClaytonAustralia
  2. 2.University of MilanMilanItaly

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-72359-4
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-72358-7
  • Online ISBN 978-3-319-72359-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book