Advertisement

Information Security Practice and Experience

13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings

  • Joseph K. Liu
  • Pierangela Samarati

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10701)

Also part of the Security and Cryptology book sub series (LNSC, volume 10701)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Blockchain

    1. Front Matter
      Pages 1-1
    2. Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo et al.
      Pages 3-24
    3. Xuan Han, Yamin Liu, Haixia Xu
      Pages 25-42
    4. Haibo Tian, Jiejie He, Liqing Fu
      Pages 43-61
    5. Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen et al.
      Pages 62-81
  3. Asymmetric Encryption

    1. Front Matter
      Pages 83-83
    2. Jinyong Chang, Honglong Dai, Maozhi Xu
      Pages 85-101
    3. Haomiao Yang, Yunfan Huang, Yong Yu, Mingxuan Yao, Xiaosong Zhang
      Pages 102-117
    4. Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, Kaitai Liang
      Pages 118-135
    5. Song Luo, Lu Yan, Jian Weng, Zheng Yang
      Pages 136-155
    6. Bo Lv, Zhiniang Peng, Shaohua Tang
      Pages 156-167
    7. Bo-Yeon Sim, Dong-Guk Han
      Pages 168-185
  4. Symmetric Encryption

    1. Front Matter
      Pages 215-215
    2. Xuan Shen, Ruilin Li, Bing Sun, Lei Cheng, Chao Li, Maodong Liao
      Pages 237-255
  5. Lattice-Based Cryptography

    1. Front Matter
      Pages 277-277
    2. Leixiao Cheng, Quanshui Wu, Yunlei Zhao
      Pages 279-296
    3. Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda
      Pages 320-330
  6. Searchable Encryption

    1. Front Matter
      Pages 331-331
    2. Yanling Li, Junzuo Lai, Chuansheng Wang, Jianghe Zhang, Jie Xiong
      Pages 333-349
    3. Jia Xu, Ee-Chien Chang, Jianying Zhou
      Pages 361-372
  7. Signature

    1. Front Matter
      Pages 373-373
    2. Cheng-Jun Lin, Xinyi Huang, Shitang Li, Wei Wu, Shao-Jun Yang
      Pages 375-390
    3. Xinxin Ma, Jun Shao, Cong Zuo, Ru Meng
      Pages 391-408
    4. Masaya Yasuda, Takeshi Shimoyama, Masahiko Takenaka, Narishige Abe, Shigefumi Yamada, Junpei Yamaguchi
      Pages 409-421
  8. Authentication

    1. Front Matter
      Pages 433-433
    2. Na Li, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Wei Wu
      Pages 435-453
    3. Jian Shen, Meng Feng, Dengzhi Liu, Chen Wang, Jiachen Jiang, Xingming Sun
      Pages 454-467
    4. Xu Yang, Xun Yi, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang et al.
      Pages 468-482
  9. Cloud Security

    1. Front Matter
      Pages 483-483
    2. Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard
      Pages 485-505
    3. Ya-Nan Li, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang, Meixia Miao
      Pages 506-524
    4. Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang-Jaccard
      Pages 539-548
  10. Network Security

    1. Front Matter
      Pages 549-549
    2. Xinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, R. V. Saraswathy, Zhe Liu
      Pages 551-565
    3. Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han
      Pages 566-575
    4. Thomas D. Wagner, Esther Palomar, Khaled Mahbub, Ali E. Abdallah
      Pages 576-586
    5. Mei-Ling Chiang, Jian-Kai Wang, Li-Chi Feng, Yang-Sen Chen, You-Chi Wang, Wen-Yu Kao
      Pages 587-598
  11. Cyber-Physical Security

    1. Front Matter
      Pages 599-599
    2. Shuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Ya-Nan Li
      Pages 601-620
    3. Tianxiang Huang, Jianying Zhou, Yi Wang, Anyu Cheng
      Pages 621-637
    4. Zhuo Wei, Yanjiang Yang, Yasmin Rehana, Yongdong Wu, Jian Weng, Robert H. Deng
      Pages 638-647

About these proceedings

Introduction

This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017.
The 34 full and 14 short papers presented together with 9 papers from the SocialSec Track in this volume were carefully reviewed and selected from 105 submissions. The papers cover topics such as blockchain, asymmetric encryption, symmetric encryption, lattice-based cryptography, searchable encryption, signature, authentication, cloud security, network security, cyber-physical security, social network and QR code security, software security and trusted computing, and SocialSec track.

Keywords

access control artificial intelligence authentication communications computer crime cryptography data mining data privacy electronic document identification systems encryption internet network security privacy privacy preserving public key encryption public keys (PK) security systems social engineering social networks

Editors and affiliations

  • Joseph K. Liu
    • 1
  • Pierangela Samarati
    • 2
  1. 1.Monash UniversityClaytonAustralia
  2. 2.University of MilanMilanItaly

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-72359-4
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-72358-7
  • Online ISBN 978-3-319-72359-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site