Advertisement

Information Security Practice and Experience

14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings

  • Chunhua Su
  • Hiroaki Kikuchi
Conference proceedings ISPEC 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11125)

Also part of the Security and Cryptology book sub series (LNSC, volume 11125)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. System Security

    1. Front Matter
      Pages 1-1
    2. Hiroya Miura, Mamoru Mimura, Hidema Tanaka
      Pages 3-18
    3. Max Landauer, Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Peter Filzmoser
      Pages 19-36
    4. Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen
      Pages 50-65
  3. Public Key Cryptography

    1. Front Matter
      Pages 67-67
    2. Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi
      Pages 69-86
    3. Jingjing Guo, Jianfeng Wang, Zhiwei Zhang, Xiaofeng Chen
      Pages 87-100
  4. Searchable and Functional Encryption

    1. Front Matter
      Pages 117-117
    2. Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu
      Pages 119-140
    3. Takato Hirano, Yutaka Kawai, Yoshihiro Koseki
      Pages 160-175
  5. (Post-quantum) Signature Schemes

    1. Front Matter
      Pages 177-177
    2. Mingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang
      Pages 198-212
    3. Lucas Schabhüser, Denis Butin, Johannes Buchmann
      Pages 213-228
  6. Security Protocols

    1. Front Matter
      Pages 263-263
    2. Binanda Sengupta, Sushmita Ruj
      Pages 282-298
    3. Jia-Ch’ng Loh, Swee-Huay Heng, Syh-Yuan Tan
      Pages 299-309
  7. Network Security

    1. Front Matter
      Pages 311-311
    2. Wenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, Jin Li
      Pages 313-328
    3. Wei Zong, Yang-Wai Chow, Willy Susilo
      Pages 329-340
    4. Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu
      Pages 341-353
  8. Authentication

    1. Front Matter
      Pages 355-355
    2. Shoichi Hirose, Junji Shikata
      Pages 357-372
    3. Wayne Chiu, Kuo-Hui Yeh, Akihito Nakamura
      Pages 391-403
  9. Side-Channel Attacks

    1. Front Matter
      Pages 405-405
    2. Bo-Yeon Sim, Kyu Young Choi, Dukjae Moon, Hyo Jin Yoon, Jihoon Cho, Dong-Guk Han
      Pages 407-423
    3. Zhiwei Yuan, Yang Li, Kazuo Sakiyama, Takeshi Sugawara, Jian Wang
      Pages 424-439
  10. Security for Cyber-physical Systems

    1. Front Matter
      Pages 453-453
    2. Yuichi Komano, Zhengfan Xia, Takeshi Kawabata, Hideo Shimizu
      Pages 455-467
    3. Alban Gabillon, Emmanuel Bruno
      Pages 468-480
    4. Jing Xu, Yuqiang Zhang, Fei Xu, Lei Zhou, Shuanglin Jiang
      Pages 481-492
  11. Security in Mobile Environment

    1. Front Matter
      Pages 493-493
    2. Entao Luo, Guojun Wang, Kun Tang, Quanyou Zhao, Chen He, Liyong Guo
      Pages 495-505
    3. Yi-Ning Liu, Yan-Ping Wang, Xiao-Fen Wang, Zhe Xia, Jingfang Xu
      Pages 506-518
  12. Secure Computation and Data Privacy

    1. Front Matter
      Pages 519-519
    2. Karin Sumongkayothin
      Pages 521-532
    3. Jimmy Tekli, Bechara Al Bouna, Youssef Bou Issa, Marc Kamradt, Ramzi Haraty
      Pages 544-556
  13. Cryptographic Protocols

    1. Front Matter
      Pages 557-557
    2. Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin
      Pages 559-577
    3. Partha Sarathi Roy, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto et al.
      Pages 578-594

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018.
The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols. 

Keywords

artificial intelligence authentication computer crime computer science cryptography data privacy digital signature electronic document identification systems encryption homomorphic encryption identity-based information security privacy privacy preserving public key cryptography public-key encryption IoT security signature scheme network security information security

Editors and affiliations

  • Chunhua Su
    • 1
  • Hiroaki Kikuchi
    • 2
  1. 1.University of AizuAizuwakamatsuJapan
  2. 2.Meiji UniversityTokyoJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-99807-7
  • Copyright Information Springer Nature Switzerland AG 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-99806-0
  • Online ISBN 978-3-319-99807-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site