Information Security and Cryptology

4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers

  • Moti Yung
  • Peng Liu
  • Dongdai Lin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5487)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Digital Signature and Signcryption Schemes

    1. Wei Zhao, Changlu Lin, Dingfeng Ye
      Pages 23-40
    2. Huaqun Wang, Hong Yu
      Pages 41-46
    3. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
      Pages 47-59
  4. Privacy and Anonymity

    1. Rui Zhang, Hideki Imai
      Pages 60-71
    2. Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
      Pages 72-83
    3. Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
      Pages 84-95
  5. Message Authentication Code and Hash Function

    1. Peng Wang, Dengguo Feng, Changlu Lin, Wenling Wu
      Pages 96-114
    2. Luk Bettale, Jean-Charles Faugère, Ludovic Perret
      Pages 115-124
  6. Secure Protocols

    1. Kun Peng, Feng Bao
      Pages 141-156
  7. Symmetric Cryptography

    1. Debra L. Cook, Moti Yung, Angelos Keromytis
      Pages 157-180
    2. Wenying Zhang, Jing Han
      Pages 181-191
    3. Guang Zeng, Yang Yang, Wenbao Han, Shuqin Fan
      Pages 192-200
  8. Certificateless Cryptography

    1. Xu an Wang, Xinyi Huang, Xiaoyuan Yang
      Pages 217-239
  9. Hardware Implementation and Side Channel Attack

    1. Mooseop Kim, Jaecheol Ryou, Sungik Jun
      Pages 240-252

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008.

The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.

Keywords

Public Key Trusted Computing anonymity code cryptography data security identity information privacy security trust

Editors and affiliations

  • Moti Yung
    • 1
  • Peng Liu
    • 2
  • Dongdai Lin
    • 3
  1. 1.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew York, NYUSA
  2. 2.College of Information Sciences and TechnologyPennsylvania State UniversityUniversity ParkUSA
  3. 3.SKLOIS, Institute of SoftwareChinese Academy of SciencesBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-01440-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-01439-0
  • Online ISBN 978-3-642-01440-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book