Information Security

15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings

  • Dieter Gollmann
  • Felix C. Freiling
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7483)

Table of contents

  1. Front Matter
  2. Invited Paper

    1. Manas Pathak, Jose Portelo, Bhiksha Raj, Isabel Trancoso
      Pages 1-22
  3. Cryptography and Cryptanalysis

    1. Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer
      Pages 23-38
    2. Bogdan Groza, Bogdan Warinschi
      Pages 39-54
  4. Mobility

    1. Sanna Suoranta, André Andrade, Tuomas Aura
      Pages 70-85
    2. Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot
      Pages 86-103
  5. Cards and Sensors

  6. Software Security

    1. Lei Zhao, Debin Gao, Lina Wang
      Pages 151-167
    2. Sami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden, Mira Mezini, Stefan Katzenbeisser
      Pages 168-187
    3. Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang et al.
      Pages 188-203
  7. Processing Encrypted Data

    1. Michael Clear, Karl Reid, Desmond Ennis, Arthur Hughes, Hitesh Tewari
      Pages 204-223
    2. Christoph Bösch, Qiang Tang, Pieter Hartel, Willem Jonker
      Pages 224-241
    3. Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser
      Pages 242-257
  8. Authentication and Identification

    1. Atsushi Fujioka, Taiichi Saito, Keita Xagawa
      Pages 258-273
  9. New Directions in Access Control

    1. Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang
      Pages 290-305
    2. Peter Drábik, Fabio Martinelli, Charles Morisset
      Pages 306-321

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012.
The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.

Keywords

RSA cryptosystem cloud security elliptic curves post-quantum cryptography searchable encryption

Editors and affiliations

  • Dieter Gollmann
    • 1
  • Felix C. Freiling
    • 2
  1. 1.Institute of Security in Distributed ApplicationsUniversity of TechnologyHamburgGermany
  2. 2.Department of Computer ScienceUniversity of Erlangen-NürnbergErlangenGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-33383-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-33382-8
  • Online ISBN 978-3-642-33383-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book