Information Security

12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings

  • Pierangela Samarati
  • Moti Yung
  • Fabio Martinelli
  • Claudio A. Ardagna

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5735)

Table of contents

  1. Front Matter
  2. Analysis Techniques

    1. Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel
      Pages 1-16
    2. Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux
      Pages 17-32
    3. Jens Bender, Marc Fischlin, Dennis Kügler
      Pages 33-48
    4. Amitabh Saxena, Brecht Wyseur, Bart Preneel
      Pages 49-58
    5. Bogdan Groza, Marius Minea
      Pages 59-67
  3. Hash Functions

  4. Database Security and Biometrics

    1. Suvasini Panigrahi, Shamik Sural
      Pages 107-120
    2. Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl
      Pages 135-142
    3. Kaushik Roy, Prabir Bhattacharya
      Pages 143-150
  5. Algebraic Attacks and Proxy Re-Encryption

    1. Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao
      Pages 151-166
    2. Nicolas T. Courtois, Sean O’Neil, Jean-Jacques Quisquater
      Pages 167-176
    3. Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li
      Pages 177-185
  6. Distributed System Security

    1. Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh
      Pages 186-201
    2. Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda
      Pages 202-217
    3. Sebastian Roschke, Feng Cheng, Robert Schuppenies, Christoph Meinel
      Pages 218-233
    4. Hongxia Jin, Serdar Pehlivanoglu
      Pages 234-241

About these proceedings


This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009.

The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services.


access control algebraic attacks anonymity applied cryptography authentication behavior-based detection biometrics block ciphers boolean function collision attacks cryptographic algorithms cryptographic pr cryptography distributed systems hash function

Editors and affiliations

  • Pierangela Samarati
    • 1
  • Moti Yung
    • 2
  • Fabio Martinelli
    • 3
  • Claudio A. Ardagna
    • 4
  1. 1.Dipartimento di Tecnologie dell’ InformazioneUniversità degli Studi di MilanoCremaItaly
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA
  3. 3.Information Security Group, Pisa Research AreaIstituto di Informatica e Telematica - IIT Consiglio Nazionale delle Ricerche - C.N.R.PisaItaly
  4. 4.Dipartimento di Tecnologie dell’InformazioneUniversità degli Studi di MilanoCremaItaly

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-04473-1
  • Online ISBN 978-3-642-04474-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book