Information Security Practice and Experience

Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedings

  • Kefei Chen
  • Robert Deng
  • Xuejia Lai
  • Jianying Zhou
Conference proceedings ISPEC 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3903)

Table of contents

  1. Front Matter
  2. Cryptoanalysis

    1. Min Feng, Bin B. Zhu, Cunlai Zhao, Shipeng Li
      Pages 13-24
    2. Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim
      Pages 33-44
  3. Network Security I

    1. Hao Luo, Binxing Fang, Xiaochun Yun
      Pages 45-56
    2. Ping Wang, Binxing Fang, Xiaochun Yun
      Pages 57-66
    3. Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi
      Pages 67-77
  4. Network Security II

    1. Feng Xie, Shuo Bai
      Pages 78-89
    2. Ji Wu, Chaoqun Ye, Shiyao Jin
      Pages 90-99
    3. Zhifei Tao, Hai Jin, Zongfen Han, En Cheng
      Pages 100-111
    4. Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu
      Pages 112-122
  5. Security Protocol

    1. Xiehua Li, Shutang Yang, Jianhua Li, Hongwen Zhu
      Pages 123-133
    2. Xiao Li, Mingxing He
      Pages 134-141
    3. Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu
      Pages 142-152
  6. Communication Security

    1. Jung Wook Lee, Yong Ho Hwang, Pil Joong Lee
      Pages 153-164
    2. Ling Dong, Kefei Chen
      Pages 165-176
    3. Jinye Peng, Guangqiang He, Jin Xiong, Guihua Zeng
      Pages 177-186
  7. Signature and Key Agreement

    1. Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
      Pages 187-201
    2. Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
      Pages 202-213

About these proceedings


This volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference 2006 (ISPEC 2006), which took place in Hangzhou, China, April 11–14, 2006. The inaugural ISPEC 2005 was held exactly one year earlier in Singapore. As applications of information security technologies become pervasive, issues pertaining to their deployment and operations are becoming increasingly imp- tant. ISPEC is an annual conference that brings together researchers and pr- titioners to provide a con?uence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. ISPEC 2006 received 307 submissions. This is probably the highest number of paper submissions in any information security-related technical conferences. Due to this exceptionally large number of submissions and the high quality of the submitted papers, not all the papers that contained innovative ideas could be accepted. Each paper was sent to at least three Program Committee m- bers for comments. Based on the reviewers’ comments and discussion by the Program Committee, of the 307 submissions, 35 were selected for inclusion in these proceedings as research track papers and another 21 papers were selected as industrial track papers and are published in the Journal of Shanghai Jiaotong University (Science).


AES Administration DOM Information Monitor RSA authentication cryptanalysis cryptographic hardware data security finite field arithmetic identity privacy security protocol trust

Editors and affiliations

  • Kefei Chen
    • 1
  • Robert Deng
    • 2
  • Xuejia Lai
    • 1
  • Jianying Zhou
    • 3
  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina
  2. 2.Singapore Management University (SMU)Singapore
  3. 3.Cryptography and Security Department Institute for Infocomm ResearchSingapore

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-33052-3
  • Online ISBN 978-3-540-33058-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book