Information Security Practice and Experience

12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings

  • Feng Bao
  • Liqun Chen
  • Robert H. Deng
  • Guojun Wang
Conference proceedings ISPEC 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10060)

Also part of the Security and Cryptology book sub series (LNSC, volume 10060)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Zhan Chen, Huaifeng Chen, Xiaoyun Wang
    Pages 1-12
  3. Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu
    Pages 13-36
  4. Jian Zhang, Yawei Zhang, Pin Liu, Jianbiao He
    Pages 48-64
  5. Jian Zhang, Wenling Wu, Yafei Zheng
    Pages 65-78
  6. Henning Kopp, Christoph Bösch, Frank Kargl
    Pages 79-93
  7. Zhoujun Ma, Li Yang, Yunlei Zhao
    Pages 94-109
  8. Jian Zhang, Wenling Wu, Yafei Zheng
    Pages 122-136
  9. Zhiniang Peng, Shaohua Tang, Ju Chen, Chen Wu, Xinglin Zhang
    Pages 151-166
  10. Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng
    Pages 167-181
  11. Zhongyuan Yao, Yi Mu, Guomin Yang
    Pages 182-193
  12. Przemysław Błaśkiewicz, Łukasz Krzywiecki, Piotr Syga
    Pages 209-223
  13. Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo
    Pages 224-237
  14. Kamil Kluczniak, Lucjan Hanzlik, Mirosław Kutyłowski
    Pages 238-254
  15. Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao
    Pages 255-270
  16. Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shi-Feng Sun, Xinyi Huang
    Pages 271-283

About these proceedings


This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.


applied cryptography big data and cloud security embedded systems security network security security systems access control cryptanalysis database security digital forensics digital rights management intrusion detection mulitmedia security privacy and anoymity risk evaluation and security certification security for cyber-physical systems security of smart cards and RFID systems security policy security protocols smart grid security smartphone security

Editors and affiliations

  • Feng Bao
    • 1
  • Liqun Chen
    • 2
  • Robert H. Deng
    • 3
  • Guojun Wang
    • 4
  1. 1.Huawei InternationalSingaporeSingapore
  2. 2.University of SurreyGuilfordUnited Kingdom
  3. 3.Singapore Management UniversitySingaporeSingapore
  4. 4.Guangzhou UniversityGuangzhouChina

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing AG 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-49150-9
  • Online ISBN 978-3-319-49151-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book