Information Security, Practice and Experience

6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings

  • Jin Kwak
  • Robert H. Deng
  • Yoojae Won
  • Guilin Wang
Conference proceedings ISPEC 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6047)

Table of contents

  1. Front Matter
  2. Cryptanalysis

    1. Yanjun Li, Wenling Wu, Lei Zhang
      Pages 19-29
    2. Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry
      Pages 45-55
  3. Algorithms and Implementations (I)

    1. Aivo Jürgenson, Jan Willemson
      Pages 56-66
    2. Katsuyuki Okeya, Hidehiro Kato, Yasuyuki Nogami
      Pages 67-84
    3. Xu Lei, Lin Dongdai
      Pages 85-95
  4. Algorithms and Implementations (II)

  5. Network Security

    1. Thomas Richard McEvoy, Stephen D. Wolthusen
      Pages 138-152
    2. Xiaoqi Jia, Xi Xiong, Jiwu Jing, Peng Liu
      Pages 153-171
    3. Zongbin Liu, Jiwu Jing, Peng Liu
      Pages 172-186
    4. Farshid Farhat, Mohammad-Reza Pakravan, Mahmoud Salmasizadeh, Mohammad-Reza Aref
      Pages 187-200
  6. Access Control

    1. Zhuo Tang, Shaohua Zhang, Kenli Li, Benming Feng
      Pages 201-216
    2. Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, Seungjoo Kim
      Pages 217-228
  7. Identity Management

    1. Inkyung Jeun, Dongho Won
      Pages 229-240
    2. Byoung-Jin Han, Dong-Whi Shin, Hyoung-Jin Lim, In-Kyung Jeun, Hyun-Chul Jung
      Pages 241-250
  8. Trust Management

About these proceedings

Keywords

access control algorithms authentication control cryptoanalysis cryptography identity identity management information security management network security privacy security trust watermarking

Editors and affiliations

  • Jin Kwak
    • 1
  • Robert H. Deng
    • 2
  • Yoojae Won
    • 3
  • Guilin Wang
    • 4
  1. 1.Department of Information Security EngineeringSoonchunhyang UniversityChungcheongnam-doKorea
  2. 2.School of Information SystemsSingapore Management UniversitySingapore
  3. 3.Internet and Security Policy DivisionKorea Internet and Security AgencySeoulKorea
  4. 4.School of Computer ScienceUniversity of BirminghamBirminghamUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-12827-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-12826-4
  • Online ISBN 978-3-642-12827-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book