© 2011

Information Security

14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings

  • Xuejia Lai
  • Jianying Zhou
  • Hui Li
Conference proceedings ISC 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7001)

Table of contents

  1. Front Matter
  2. Attacks

    1. Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao et al.
      Pages 1-16
    2. Jiageng Chen, Atsuko Miyaji
      Pages 32-46
  3. Protocols

    1. Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete
      Pages 47-62
    2. Shinsaku Kiyomoto, Matt Henricksen, Wun-She Yap, Yuto Nakano, Kazuhide Fukushima
      Pages 63-78
    3. Hu Xiong, Qianhong Wu, Zhong Chen
      Pages 79-94
  4. Public-Key Cryptosystems

  5. Network Security

    1. Guanhua Yan, Songqing Chen, Stephan Eidenbenz
      Pages 135-151
    2. Ge Zhang, Simone Fischer-Hübner
      Pages 152-167
  6. Software Security

    1. Hui Fang, Yongdong Wu, Shuhong Wang, Yin Huang
      Pages 168-181
    2. Ruoxu Zhao, Dawu Gu, Juanru Li, Ran Yu
      Pages 182-196
  7. System Security

    1. Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos
      Pages 197-212
    2. Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen
      Pages 213-228
    3. Moritz Y. Becker, Masoud Koleini
      Pages 229-245
  8. Database Security

    1. Sven Laur, Jan Willemson, Bingsheng Zhang
      Pages 262-277
    2. Sha Ma, Bo Yang, Kangshun Li, Feng Xia
      Pages 278-292

About these proceedings


This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.


browser security hash function key generation algorithm multiple identity-based encryption virtualization

Editors and affiliations

  • Xuejia Lai
    • 1
  • Jianying Zhou
    • 2
  • Hui Li
    • 3
  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityMin Hang ShanghaiChina
  2. 2.Cryptography and Security DepartmentInstitute for Infocomm ResearchSingapore
  3. 3.Key Laboratory of Computer Networks and InformationSecurity Xidian UniversityShaanxiChina

Bibliographic information