Advertisement

Information Security Practice and Experience

7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings

  • Feng Bao
  • Jian Weng
Conference proceedings ISPEC 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6672)

Table of contents

  1. Front Matter
  2. Public Key Encryption

    1. Yamin Liu, Bao Li, Xianhui Lu, Xiaoying Jia
      Pages 14-23
    2. Junzuo Lai, Robert H. Deng, Yingjiu Li
      Pages 24-39
  3. Cloud Security

  4. Security Applications

    1. Saeed Sedghi, Pieter Hartel, Willem Jonker, Svetla Nikova
      Pages 108-122
    2. Yikai Wang, Yi Mu, Minjie Zhang
      Pages 123-137
    3. Xuhua Zhou, Xuhua Ding, Kefei Chen
      Pages 138-151
  5. Post-quantum Cryptography and Side-Channel Attack

    1. Michael Rose, Thomas Plantard, Willy Susilo
      Pages 152-167
    2. Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin
      Pages 168-180
    3. Guangdong Yang, Shaohua Tang, Li Yang
      Pages 181-195
    4. Jiye Liu, Yongbin Zhou, Yang Han, Jiantang Li, Shuguo Yang, Dengguo Feng
      Pages 196-207
  6. Block Ciphers and MACs

    1. Bo Liang, Wenling Wu, Liting Zhang
      Pages 233-246
    2. Bozhong Liu, Zheng Gong, Weidong Qiu, Dong Zheng
      Pages 247-256
  7. Signature, Secrete Sharing and Traitor Tracing

    1. Qiong Huang, Duncan S. Wong
      Pages 257-272
    2. Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian
      Pages 288-301
    3. Xingwen Zhao, Fangguo Zhang
      Pages 302-316
  8. System Security and Network Security

    1. Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu
      Pages 317-332
    2. Tristan Allard, Benjamin Nguyen, Philippe Pucheral
      Pages 333-342
    3. Jonghoon Kwon, Jehyun Lee, Heejo Lee
      Pages 343-361
    4. Quan Pham, Jason Reid, Ed Dawson
      Pages 362-371
  9. Security Protocols

  10. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.

Keywords

access control e-voting elliptic curves obfuscation privacy

Editors and affiliations

  • Feng Bao
    • 1
  • Jian Weng
    • 2
  1. 1.Institute for Infocomm ResearchSingaporeSingapore
  2. 2.Jinan UniversityTianhe DistrictChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-21031-0
  • Copyright Information Springer Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-21030-3
  • Online ISBN 978-3-642-21031-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site