Information Security Practice and Experience

9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings

  • Robert H. Deng
  • Tao Feng
Conference proceedings ISPEC 2013

DOI: 10.1007/978-3-642-38033-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7863)

Table of contents

  1. Front Matter
  2. Network Security

    1. Stefan Kraxberger, Ronald Toegl, Martin Pirker, Elisa Pintado Guijarro, Guillermo Garcia Millan
      Pages 16-30
    2. Mixia Liu, Tao Feng, Paul Smith, David Hutchison
      Pages 31-43
    3. Yuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen, Yingjun Zhang
      Pages 44-59
  3. Identity-Based Cryptography

    1. Hao Xiong, Tsz Hon Yuen, Cong Zhang, Yi-Jun He, Siu Ming Yiu
      Pages 60-74
    2. Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu
      Pages 75-90
    3. Kefeng Wang, Yi Mu, Willy Susilo
      Pages 91-104
    4. Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei
      Pages 105-116
  4. Cryptographic Primitives

    1. Junzuo Lai, Xuhua Ding, Yongdong Wu
      Pages 117-131
    2. Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang
      Pages 132-146
    3. Wei Yu, Kunpeng Wang, Bao Li, Song Tian
      Pages 147-159
    4. Wei Yu, Kunpeng Wang, Bao Li, Song Tian
      Pages 160-173
  5. Security Protocols

    1. Divyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg
      Pages 174-188
    2. Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan
      Pages 189-203
    3. Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong
      Pages 204-217
    4. Lucjan Hanzlik, Łukasz Krzywiecki, Mirosław Kutyłowski
      Pages 218-232
  6. System Security

    1. Shichao Jin, Okhee Kim, Tieming Chen
      Pages 248-262
    2. Jungin Kang, Sangwook Lee, Heejo Lee
      Pages 263-277

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks.

Keywords

attack detection authentication authorisation encryption sanitizable signatures

Editors and affiliations

  • Robert H. Deng
    • 1
  • Tao Feng
    • 2
  1. 1.School of Information SystemsSingapore Management UniversitySingaporeSingapore
  2. 2.School of Computer and CommunicationUniversity of technologyLanzhouChina

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38032-7
  • Online ISBN 978-3-642-38033-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349