Skip to main content
  • Conference proceedings
  • © 2008

Information Security

11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5222)

Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Digital Signatures

    1. Certificate-Based Signature Schemes without Pairings or Random Oracles

      • Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou
      Pages 285-297
  2. AES Special Session

    1. Improved Impossible Differential Attacks on Large-Block Rijndael

      • Lei Zhang, Wenling Wu, Je Hong Park, Bon Wook Koo, Yongjin Yeom
      Pages 298-315
    2. A Five-Round Algebraic Property of the Advanced Encryption Standard

      • Jianyong Huang, Jennifer Seberry, Willy Susilo
      Pages 316-330
    3. Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip

      • Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust
      Pages 341-354
  3. Symmetric Cryptography and Hash Functions

    1. Collisions for RC4-Hash

      • Sebastiaan Indesteege, Bart Preneel
      Pages 355-366
    2. New Applications of Differential Bounds of the SDS Structure

      • Jiali Choy, Khoongming Khoo
      Pages 367-384
  4. Authentication

    1. HAPADEP: Human-Assisted Pure Audio Device Pairing

      • Claudio Soriente, Gene Tsudik, Ersin Uzun
      Pages 385-400
    2. One-Time Password Access to Any Server without Changing the Server

      • Dinei Florêncio, Cormac Herley
      Pages 401-420
    3. Can “Something You Know” Be Saved?

      • Baris Coskun, Cormac Herley
      Pages 421-440
  5. Security Protocols

    1. A New (k,n)-Threshold Secret Sharing Scheme and Its Extension

      • Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
      Pages 455-470
    2. Strong Accumulators from Collision-Resistant Hashing

      • Philippe Camacho, Alejandro Hevia, Marcos Kiwi, Roberto Opazo
      Pages 471-486
    3. A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance

      • Yali Liu, Ken Chiang, Cherita Corbett, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal
      Pages 487-501
  6. Back Matter

Other Volumes

  1. Information Security

About this book

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008.

The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signatures, AES, symmetric cryptography and hash functions, authentication as well as security protocols.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access