Information Security

13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers

  • Mike Burmester
  • Gene Tsudik
  • Spyros Magliveras
  • Ivana Ilić

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6531)

Table of contents

  1. Front Matter
  2. Attacks and Analysis

    1. Kota Ideguchi, Elmar Tischhauser, Bart Preneel
      Pages 1-16
    2. Yi Lu, Yvo Desmedt
      Pages 17-23
    3. Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang
      Pages 24-30
    4. Nadhem J. AlFardan, Kenneth G. Paterson
      Pages 31-38
  3. Analysis

    1. Elena Andreeva, Bart Mennink, Bart Preneel
      Pages 39-53
    2. Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Tereza C. M. B. Carvalho
      Pages 69-83
  4. Authentication, PIR and Content Identification

    1. Christian Wachsmann, Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter
      Pages 84-98
    2. Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow
      Pages 99-113
    3. Yali Liu, Ahmad-Reza Sadeghi, Dipak Ghosal, Biswanath Mukherjee
      Pages 129-135
  5. Privacy

    1. Georg Neugebauer, Ulrike Meyer, Susanne Wetzel
      Pages 136-151
    2. Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede
      Pages 159-165
  6. Malware, Crimeware and Code Injection

    1. Zhi Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie
      Pages 181-195
    2. Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis
      Pages 196-202
    3. Elias Athanasopoulos, Antonis Krithinakis, Evangelos P. Markatos
      Pages 203-209
  7. Intrusion Detection

    1. Lei Wei, Michael K. Reiter, Ketan Mayer-Patel
      Pages 210-225

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held in Boca Raton, FL, USA, in October 2010.

The 25 revised full papers and the 11 short papers presented were carefully reviewed and selected from 117 submissions. The papers are organized in topical sections on attacks and analysis; analysis; authentication, PIR and content identification; privacy; malware, crimeware and code injection; intrusion detection; side channels; cryptography; smartphones; biometrics; cryptography, application; buffer overflow; and cryptography, theory.

Keywords

DNS SHA-3 access control anonymity authentication biometrics block ciphers classification collision attacks cryptanalysis cryptographic algorithms cryptographic protocols data structure denial of service digital rights management digital signature e-commerce hash function malware network security peer-to-peer privacy security side-channel attacks spyware stream cipher trusted computing usability

Editors and affiliations

  • Mike Burmester
    • 1
  • Gene Tsudik
    • 2
  • Spyros Magliveras
    • 3
  • Ivana Ilić
    • 4
  1. 1.Center for Security and Assurance in IT (C-SAIT), Department of Computer ScienceFlorida State UniversityTallahasseeUSA
  2. 2.Department of Computer ScienceUniversity of California, IrvineUSA
  3. 3.Center for Cryptology and Information Security (CCIS), Department of Mathematical SciencesFlorida Atlantic UniversityBoca RatonUSA
  4. 4.Mathematical Sciences DepartmentFlorida Atlantic UniversityBoca RatonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-18178-8
  • Copyright Information Springer Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-18177-1
  • Online ISBN 978-3-642-18178-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book