Information Security Practice and Experience

5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings

  • Feng Bao
  • Hui Li
  • Guilin Wang

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5451)

Table of contents

  1. Front Matter
  2. Public Key Encryption

    1. Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker
      Pages 1-12
    2. Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi
      Pages 13-23
    3. Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou
      Pages 24-34
  3. Digital Signatures

  4. System Security

    1. Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Farley, Xuxian Jiang
      Pages 59-70
    2. Xianggen Wang, Dengguo Feng, Purui Su
      Pages 71-82
    3. Xinsong Wu, Zhouyi Zhou, Yeping He, Hongliang Liang
      Pages 83-92
  5. Applied Cryptography

    1. Guifang Huang, Dongdai Lin, Yanshuo Zhang
      Pages 93-101
    2. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
      Pages 112-123
    3. Qi Cheng, Yong Yin, Kun Xiao, Ching-Fang Hsu
      Pages 124-135
  6. Multimedia Security and DRM

    1. Hongxia Jin, Jeffrey Lotspiech
      Pages 147-158
    2. Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won
      Pages 159-170
  7. Security Protocols

    1. Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister, Arne-Kristian Groven
      Pages 171-182
    2. Xiaojuan Cai, Yonggen Gu
      Pages 183-194
    3. Kun Peng
      Pages 195-206
  8. Key Exchange and Management

    1. Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta
      Pages 219-229
    2. Farshid Farhat, Somayeh Salimi, Ahmad Salahi
      Pages 230-244
    3. Mohamed Karroumi, Ayoub Massoudi
      Pages 245-256
  9. Hash Functions and MACs

    1. Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks
      Pages 257-273
    2. Gaoli Wang, Shaohui Wang
      Pages 274-284
  10. Cryptanalysis

    1. Ewan Fleischmann, Michael Gorski, Stefan Lucks
      Pages 298-309
    2. Ewan Fleischmann, Michael Gorski, Stefan Lucks
      Pages 310-323
    3. Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su
      Pages 324-335
    4. Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
      Pages 336-344
  11. Network Security

    1. Liang Lu, Rei Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong et al.
      Pages 345-359
    2. Feng Cheng, Sebastian Roschke, Christoph Meinel
      Pages 360-371
  12. Security Applications

    1. Shaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng
      Pages 372-383
    2. Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu
      Pages 384-395
    3. Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy
      Pages 396-407
  13. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 5th International Information Security Practice and Experience Conference, ISPEC 2009, held in Xi'an, China in April 2009.

The 34 revised full papers were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on public key encryption, digital signatures, system security, applied cryptography, multimedia security and DRM, security protocols, key exchange and management, hash functions and MACs, cryptanalysis, network security as well as security applications.


Information RFID RSA Trusted Computing VoIP access control anonymity e-Voting intrusion detection networks pairing particle swarm privacy security trust

Editors and affiliations

  • Feng Bao
    • 1
  • Hui Li
    • 2
  • Guilin Wang
    • 3
  1. 1.Institute for Infocomm Research (I<Superscript>2</Superscript>R) 1South TowerSingapore
  2. 2.School of Telecommunications EngineeringXidian UniversityXi’an, ShaanxiP. R. China
  3. 3.School of Computer ScienceUniversity of Birmingham Homepage:

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-00842-9
  • Online ISBN 978-3-642-00843-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site