Skip to main content
  • Conference proceedings
  • © 2011

Information Security

13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6531)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2010.

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Table of contents (36 papers)

  1. Front Matter

  2. Attacks and Analysis

    1. Improved Collision Attacks on the Reduced-Round Grøstl Hash Function

      • Kota Ideguchi, Elmar Tischhauser, Bart Preneel
      Pages 1-16
    2. Improved Distinguishing Attack on Rabbit

      • Yi Lu, Yvo Desmedt
      Pages 17-23
    3. Cryptanalysis of the Convex Hull Click Human Identification Protocol

      • Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang
      Pages 24-30
    4. An Analysis of DepenDNS

      • Nadhem J. AlFardan, Kenneth G. Paterson
      Pages 31-38
  3. Analysis

    1. Security Reductions of the Second Round SHA-3 Candidates

      • Elena Andreeva, Bart Mennink, Bart Preneel
      Pages 39-53
    2. Revisiting the Security of the Alred Design

      • Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Tereza C. M. B. Carvalho
      Pages 69-83
  4. Authentication, PIR and Content Identification

    1. Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices

      • Christian Wachsmann, Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter
      Pages 84-98
    2. Implicit Authentication through Learning User Behavior

      • Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow
      Pages 99-113
    3. Video Streaming Forensic – Content Identification with Traffic Snooping

      • Yali Liu, Ahmad-Reza Sadeghi, Dipak Ghosal, Biswanath Mukherjee
      Pages 129-135
  5. Privacy

    1. Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets

      • Georg Neugebauer, Ulrike Meyer, Susanne Wetzel
      Pages 136-151
    2. Privacy-Preserving ECC-Based Grouping Proofs for RFID

      • Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede
      Pages 159-165
  6. Malware, Crimeware and Code Injection

    1. Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation

      • Zhi Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie
      Pages 181-195
    2. Crimeware Swindling without Virtual Machines

      • Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis
      Pages 196-202
    3. An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications

      • Elias Athanasopoulos, Antonis Krithinakis, Evangelos P. Markatos
      Pages 203-209
  7. Intrusion Detection

    1. Summary-Invisible Networking: Techniques and Defenses

      • Lei Wei, Michael K. Reiter, Ketan Mayer-Patel
      Pages 210-225

Other Volumes

  1. Information Security

About this book

This book constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held in Boca Raton, FL, USA, in October 2010. The 25 revised full papers and the 11 short papers presented were carefully reviewed and selected from 117 submissions. The papers are organized in topical sections on attacks and analysis; analysis; authentication, PIR and content identification; privacy; malware, crimeware and code injection; intrusion detection; side channels; cryptography; smartphones; biometrics; cryptography, application; buffer overflow; and cryptography, theory.

Editors and Affiliations

  • Center for Security and Assurance in IT (C-SAIT), Department of Computer Science, Florida State University, Tallahassee, USA

    Mike Burmester

  • Department of Computer Science, University of California, Irvine, USA

    Gene Tsudik

  • Center for Cryptology and Information Security (CCIS), Department of Mathematical Sciences, Florida Atlantic University, Boca Raton, USA

    Spyros Magliveras

  • Mathematical Sciences Department, Florida Atlantic University, Boca Raton, USA

    Ivana Ilić

Bibliographic Information

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access