Advertisement

Information Security Practice and Experience

First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings

  • Robert H. Deng
  • Feng Bao
  • HweeHwa Pang
  • Jianying Zhou
Conference proceedings ISPEC 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3439)

Table of contents

  1. Front Matter
  2. Network Security

    1. Stephan Riebach, Erwin P. Rathgeb, Birger Toedtmann
      Pages 1-12
    2. Philip Robinson, Christian Schaefer, Thomas Walter
      Pages 13-24
    3. Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, William A. Arbaugh
      Pages 36-47
  3. Cryptographic Techniques I

    1. Patrick P. Tsang, Victor K. Wei
      Pages 48-60
    2. Marcel Fernandez, Miguel Soriano, Josep Cotrina
      Pages 61-73
    3. Heejin Park, Sang Kil Park, Ki-Ryong Kwon, Dong Kyue Kim
      Pages 74-84
    4. Mustapha Hedabou, Pierre Pinel, Lucien Bénéteau
      Pages 85-96
  4. Secure Architecture I

    1. Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo
      Pages 97-108
    2. Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu
      Pages 109-120
    3. Yanjun Wu, Wenchang Shi, Hongliang Liang, Qinghua Shang, Chunyang Yuan, Liang Bin
      Pages 121-131
    4. Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes
      Pages 132-143
  5. Access Control

    1. Frode Hansen, Vladimir Oleshchuk
      Pages 144-155
    2. Xu Liao, Li Zhang, Stephen C. F. Chan
      Pages 168-177
  6. Intrusion Detection

    1. Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari
      Pages 192-203
    2. Andre Adelsbach, Sebastian Gajek, Jörg Schwenk
      Pages 204-216
    3. Zhuowei Li, Amitabha Das, Sabu Emmanuel
      Pages 217-229
  7. Applications and Case Studies

    1. Kerstin Lemke, Ahmad-Reza Sadeghi, Christian Stüble
      Pages 230-242
    2. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
      Pages 255-267
  8. Secure Architecture II

    1. Hany A. Samuel, Yasser H. Dakroury, Hussein I. Shahein
      Pages 280-292
    2. Wenbao Jiang, Chen Li, Shuang Hao, Yiqi Dai
      Pages 293-301
    3. Tao Zhang, Mingzeng Hu, Xiaochun Yun, Yongzheng Zhang
      Pages 302-313
    4. Xiaoqin Huang, Lin Chen, Linpeng Huang, Minglu Li
      Pages 314-325
  9. Data Security

    1. Ahmad-Reza Sadeghi, Christian Stüble
      Pages 326-337
    2. Chin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin
      Pages 338-349
    3. Yanmei Fang, Limin Gu, Jiwu Huang
      Pages 350-361
    4. Fangyong Hou, Zhiying Wang, Kui Dai, Yun Liu
      Pages 362-373
  10. Cryptographic Techniques II

    1. Zuowen Tan, Zhuojun Liu, Mingsheng Wang
      Pages 374-385
    2. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
      Pages 386-397
    3. Marcel Fernandez, Miguel Soriano, Josep Cotrina
      Pages 398-409
    4. Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang
      Pages 410-421
  11. Back Matter

About these proceedings

Introduction

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission,reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference.

Keywords

DRM Denial of Service Information Routing Session authentication information security installatioin intrusion detection network security oblivious transfer secure communications security systems security trust

Editors and affiliations

  • Robert H. Deng
    • 1
  • Feng Bao
    • 2
  • HweeHwa Pang
    • 3
  • Jianying Zhou
    • 4
  1. 1.School of Information SystemsSingapore Management UniversitySingapore
  2. 2.Institute for Infocomm ResearchSingapore
  3. 3.School of Information SystemsSingapore Management University 
  4. 4.Cryptography and Security Department Institute for Infocomm ResearchSingapore

Bibliographic information

  • DOI https://doi.org/10.1007/b107167
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-25584-0
  • Online ISBN 978-3-540-31979-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site