Advertisement

Information Security, Practice and Experience

6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings

  • Jin Kwak
  • Robert H. Deng
  • Yoojae Won
  • Guilin Wang
Conference proceedings ISPEC 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6047)

Table of contents

  1. Front Matter
  2. Cryptanalysis

    1. Yanjun Li, Wenling Wu, Lei Zhang
      Pages 19-29
    2. Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry
      Pages 45-55
  3. Algorithms and Implementations (I)

    1. Aivo Jürgenson, Jan Willemson
      Pages 56-66
    2. Katsuyuki Okeya, Hidehiro Kato, Yasuyuki Nogami
      Pages 67-84
    3. Xu Lei, Lin Dongdai
      Pages 85-95
  4. Algorithms and Implementations (II)

  5. Network Security

    1. Thomas Richard McEvoy, Stephen D. Wolthusen
      Pages 138-152
    2. Xiaoqi Jia, Xi Xiong, Jiwu Jing, Peng Liu
      Pages 153-171
    3. Zongbin Liu, Jiwu Jing, Peng Liu
      Pages 172-186
    4. Farshid Farhat, Mohammad-Reza Pakravan, Mahmoud Salmasizadeh, Mohammad-Reza Aref
      Pages 187-200
  6. Access Control

    1. Zhuo Tang, Shaohua Zhang, Kenli Li, Benming Feng
      Pages 201-216
    2. Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, Seungjoo Kim
      Pages 217-228
  7. Identity Management

    1. Inkyung Jeun, Dongho Won
      Pages 229-240
    2. Byoung-Jin Han, Dong-Whi Shin, Hyoung-Jin Lim, In-Kyung Jeun, Hyun-Chul Jung
      Pages 241-250
  8. Trust Management

    1. Daren Zha, Jiwu Jing, Le Kang
      Pages 264-275
  9. Public Key Cryptography

    1. S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
      Pages 294-307
    2. Yazhe Zhang, Kunpeng Wang, Bao Li
      Pages 308-323
  10. Security Applications

    1. Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan
      Pages 359-376
    2. Youngsook Lee, Hyungkyu Yang, Dongho Won
      Pages 377-385
    3. Kwangwoo Lee, Yunho Lee, Dongho Won, Seungjoo Kim
      Pages 386-397
  11. Back Matter

About these proceedings

Keywords

access control algorithms authentication control cryptoanalysis cryptography identity identity management information security management network security privacy security trust watermarking

Editors and affiliations

  • Jin Kwak
    • 1
  • Robert H. Deng
    • 2
  • Yoojae Won
    • 3
  • Guilin Wang
    • 4
  1. 1.Department of Information Security EngineeringSoonchunhyang UniversityChungcheongnam-doKorea
  2. 2.School of Information SystemsSingapore Management UniversitySingapore
  3. 3.Internet and Security Policy DivisionKorea Internet and Security AgencySeoulKorea
  4. 4.School of Computer ScienceUniversity of BirminghamBirminghamUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-12827-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-12826-4
  • Online ISBN 978-3-642-12827-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site