Information Security

11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

  • Editors
  • Tzong-Chen Wu
  • Chin-Laung Lei
  • Vincent Rijmen
  • Der-Tsai Lee
Conference proceedings ISC 2008
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5222)

Table of contents

  1. Front Matter
  2. Trusted Computing

    1. Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
      Pages 1-16
    2. Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi
      Pages 17-30
    3. Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi
      Pages 31-46
    4. David Champagne, Reouven Elbaz, Ruby B. Lee
      Pages 47-63
  3. Database and System Security

    1. Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao
      Pages 64-79
    2. Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
      Pages 80-96
    3. Lei Liu, Songqing Chen, Guanhua Yan, Zhao Zhang
      Pages 97-113
  4. Intrusion Detection

    1. Ryan Iwahashi, Daniela A. S. de Oliveira, S. Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jin-Tae Oh et al.
      Pages 114-130
    2. Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng
      Pages 131-145
  5. Network Security

    1. Elias Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, Sotiris Ioannidis, K. G. Anagnostakis et al.
      Pages 146-160
    2. Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos
      Pages 161-174
    3. Vanessa Frias-Martinez, Salvatore J. Stolfo, Angelos D. Keromytis
      Pages 175-190
    4. Matthew Burnside, Angelos D. Keromytis
      Pages 191-203
  6. Cryptanalysis

    1. Yi Lu, Huaxiong Wang, San Ling
      Pages 204-214
    2. Jintai Ding, Dieter Schmidt, Fabian Werner
      Pages 215-227
    3. Subhamoy Maitra, Santanu Sarkar
      Pages 228-243
    4. Somitra Kumar Sanadhya, Palash Sarkar
      Pages 244-259
  7. Digital Signatures

    1. Sherman S. M. Chow, Raphael C. -W. Phan
      Pages 260-276

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008.

The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signatures, AES, symmetric cryptography and hash functions, authentication as well as security protocols.

Keywords

AES Applied Cryptography Cryptographic Algorithms Cryptographic Protocols Formal Methods in Security Foundations of Computer Security Identity and Trust Management; authentication cryptanalysis database secutiry digital signatures hash function

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-85886-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-85884-3
  • Online ISBN 978-3-540-85886-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book