Information Security

11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

  • Editors
  • Tzong-Chen Wu
  • Chin-Laung Lei
  • Vincent Rijmen
  • Der-Tsai Lee
Conference proceedings ISC 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5222)

Table of contents

  1. Front Matter
  2. Trusted Computing

    1. Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
      Pages 1-16
    2. Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi
      Pages 17-30
    3. Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi
      Pages 31-46
    4. David Champagne, Reouven Elbaz, Ruby B. Lee
      Pages 47-63
  3. Database and System Security

    1. Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao
      Pages 64-79
    2. Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
      Pages 80-96
    3. Lei Liu, Songqing Chen, Guanhua Yan, Zhao Zhang
      Pages 97-113
  4. Intrusion Detection

    1. Ryan Iwahashi, Daniela A. S. de Oliveira, S. Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jin-Tae Oh et al.
      Pages 114-130
    2. Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng
      Pages 131-145
  5. Network Security

    1. Elias Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, Sotiris Ioannidis, K. G. Anagnostakis et al.
      Pages 146-160
    2. Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos
      Pages 161-174
    3. Vanessa Frias-Martinez, Salvatore J. Stolfo, Angelos D. Keromytis
      Pages 175-190
    4. Matthew Burnside, Angelos D. Keromytis
      Pages 191-203
  6. Cryptanalysis

    1. Yi Lu, Huaxiong Wang, San Ling
      Pages 204-214
    2. Jintai Ding, Dieter Schmidt, Fabian Werner
      Pages 215-227
    3. Subhamoy Maitra, Santanu Sarkar
      Pages 228-243
    4. Somitra Kumar Sanadhya, Palash Sarkar
      Pages 244-259
  7. Digital Signatures

    1. Sherman S. M. Chow, Raphael C. -W. Phan
      Pages 260-276
    2. Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou
      Pages 285-297
  8. AES Special Session

    1. Lei Zhang, Wenling Wu, Je Hong Park, Bon Wook Koo, Yongjin Yeom
      Pages 298-315
    2. Jianyong Huang, Jennifer Seberry, Willy Susilo
      Pages 316-330
    3. Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust
      Pages 341-354
  9. Symmetric Cryptography and Hash Functions

    1. Sebastiaan Indesteege, Bart Preneel
      Pages 355-366
    2. Jiali Choy, Khoongming Khoo
      Pages 367-384
  10. Authentication

    1. Claudio Soriente, Gene Tsudik, Ersin Uzun
      Pages 385-400
    2. Dinei Florêncio, Cormac Herley
      Pages 401-420
    3. Baris Coskun, Cormac Herley
      Pages 421-440
  11. Security Protocols

    1. Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
      Pages 455-470
    2. Philippe Camacho, Alejandro Hevia, Marcos Kiwi, Roberto Opazo
      Pages 471-486
    3. Yali Liu, Ken Chiang, Cherita Corbett, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal
      Pages 487-501
  12. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008.

The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signatures, AES, symmetric cryptography and hash functions, authentication as well as security protocols.


AES Applied Cryptography Cryptographic Algorithms Cryptographic Protocols Formal Methods in Security Foundations of Computer Security Identity and Trust Management; authentication cryptanalysis database secutiry digital signatures hash function

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-85884-3
  • Online ISBN 978-3-540-85886-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site