Advertisement

Information Security

11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

  • Editors
  • Tzong-Chen Wu
  • Chin-Laung Lei
  • Vincent Rijmen
  • Der-Tsai Lee
Conference proceedings ISC 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5222)

Table of contents

  1. Digital Signatures

    1. Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou
      Pages 285-297
  2. AES Special Session

    1. Lei Zhang, Wenling Wu, Je Hong Park, Bon Wook Koo, Yongjin Yeom
      Pages 298-315
    2. Jianyong Huang, Jennifer Seberry, Willy Susilo
      Pages 316-330
    3. Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust
      Pages 341-354
  3. Symmetric Cryptography and Hash Functions

    1. Sebastiaan Indesteege, Bart Preneel
      Pages 355-366
    2. Jiali Choy, Khoongming Khoo
      Pages 367-384
  4. Authentication

    1. Claudio Soriente, Gene Tsudik, Ersin Uzun
      Pages 385-400
    2. Dinei Florêncio, Cormac Herley
      Pages 401-420
    3. Baris Coskun, Cormac Herley
      Pages 421-440
  5. Security Protocols

    1. Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
      Pages 455-470
    2. Philippe Camacho, Alejandro Hevia, Marcos Kiwi, Roberto Opazo
      Pages 471-486
    3. Yali Liu, Ken Chiang, Cherita Corbett, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal
      Pages 487-501
  6. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008.

The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signatures, AES, symmetric cryptography and hash functions, authentication as well as security protocols.

Keywords

AES Applied Cryptography Cryptographic Algorithms Cryptographic Protocols Formal Methods in Security Foundations of Computer Security Identity and Trust Management; authentication cryptanalysis database secutiry digital signatures hash function

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-85886-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-85884-3
  • Online ISBN 978-3-540-85886-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site