Skip to main content
  • Conference proceedings
  • © 2009

Information Security Practice and Experience

5th International Conference, ISPEC 2009 Xi'an, China, April 13-15, 2009 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5451)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISPEC: International Conference on Information Security Practice and Experience

Conference proceedings info: ISPEC 2009.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (34 papers)

  1. Front Matter

  2. Public Key Encryption

    1. Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes

      • Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker
      Pages 1-12
    2. A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

      • Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi
      Pages 13-23
    3. RSA-Based Certificateless Public Key Encryption

      • Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou
      Pages 24-34
  3. Digital Signatures

    1. Strongly Unforgeable ID-Based Signatures without Random Oracles

      • Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
      Pages 35-46
  4. System Security

    1. An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems

      • Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Farley, Xuxian Jiang
      Pages 59-70
    2. Reconstructing a Packed DLL Binary for Static Analysis

      • Xianggen Wang, Dengguo Feng, Purui Su
      Pages 71-82
    3. Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework

      • Xinsong Wu, Zhouyi Zhou, Yeping He, Hongliang Liang
      Pages 83-92
  5. Applied Cryptography

    1. Efficient Concurrent n poly(logn)-Simulatable Argument of Knowledge

      • Guifang Huang, Dongdai Lin, Yanshuo Zhang
      Pages 93-101
    2. Certificateless Hybrid Signcryption

      • Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
      Pages 112-123
    3. On Non-representable Secret Sharing Matroids

      • Qi Cheng, Yong Yin, Kun Xiao, Ching-Fang Hsu
      Pages 124-135
  6. Multimedia Security and DRM

    1. Defending against the Pirate Evolution Attack

      • Hongxia Jin, Jeffrey Lotspiech
      Pages 147-158
    2. Security Specification for Conversion Technologies of Heterogeneous DRM Systems

      • Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won
      Pages 159-170
  7. Security Protocols

    1. Analysing Protocol Implementations

      • Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister, Arne-Kristian Groven
      Pages 171-182
    2. Measuring Anonymity

      • Xiaojuan Cai, Yonggen Gu
      Pages 183-194
    3. A Hybrid E-Voting Scheme

      • Kun Peng
      Pages 195-206
  8. Key Exchange and Management

Other Volumes

  1. Information Security Practice and Experience

About this book

The 5th International Conference on Information Security Practice and Expe- ence (ISPEC 2009) was held in Xi’an, China, April 13–15, 2009. The ISPEC conference series is an established forum that brings together - searchers and practitioners to provide a con?uence of new information security technologies, including their applications and their integration with IT systems in various vertical sectors. In previous years, ISPEC has taken place in Sin- pore (2005), Hangzhou, China (2006), Hong Kong, China (2007), and Sydney, Australia (2008). For all sessions, as this one, the conference proceedings were published by Springer in the Lecture Notes in Computer Science series. In total, 147 papers from 26 countries were submitted to ISPEC 2009, and 34 were ?nally selected for inclusion in the proceedings (acceptance rate 23%). The accepted papers cover multiple topics of information security and applied cryptography. Each submission was anonymously reviewed by at least three - viewers. We are grateful to the Program Committee, which was composed of more than 40 well-known security experts from 15 countries; we heartily thank them as well as all external reviewers for their time and valued contributions to the tough and time-consuming reviewing process. Inadditiontothe regularpaperpresentations,the programalsofeaturedfour invited talks by Yupu Hu, from Xidian University, China; Youki Kadobayashi, from Nara Institute of Science and Technology, Japan; Mark Ryan, from the University of Birmingham, UK; and Gene Tsudik, from the University of C- ifornia at Irvine, USA. We are grateful to them for accepting our invitation to speak at the conference.

Keywords

  • Information
  • RFID
  • RSA
  • Trusted Computing
  • VoIP
  • access control
  • anonymity
  • e-Voting
  • intrusion detection
  • networks
  • pairing
  • particle swarm
  • privacy
  • security
  • trust

Editors and Affiliations

  • Institute for Infocomm Research (I<Superscript>2</Superscript>R) 1, South Tower, Singapore

    Feng Bao

  • School of Telecommunications Engineering, Xidian University, Xi’an, Shaanxi, P. R. China

    Hui Li

  • School of Computer Science, University of Birmingham Homepage: http://www.cs.bham.ac.uk/~gzw/, Birmingham, UK

    Guilin Wang

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions