Information Security Practice and Experience

8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings

  • Mark D. Ryan
  • Ben Smyth
  • Guilin Wang
Conference proceedings ISPEC 2012

DOI: 10.1007/978-3-642-29101-2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7232)

Table of contents

  1. Front Matter
  2. Digital Signatures

    1. Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan
      Pages 1-16
    2. Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer
      Pages 17-33
  3. Public Key Cryptography

    1. Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu
      Pages 34-45
    2. Chong-zhi Gao, Dongqing Xie, Baodian Wei
      Pages 46-62
    3. Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, Hideki Sakurada
      Pages 63-79
  4. Cryptanalysis I: Differential Attacks

    1. Dongxia Bai, Leibo Li
      Pages 80-96
    2. Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li
      Pages 97-108
    3. Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
      Pages 109-125
  5. Applications I.i: Oblivious Transfer

    1. Preetha Mathew K., Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan
      Pages 144-157
  6. Applications I.ii: Internet Security (Works-in-Progress)

    1. Lei Wang, Ji Xiang, Jiwu Jing, Lingchen Zhang
      Pages 158-169
    2. Yang-Wai Chow, Willy Susilo
      Pages 170-181
  7. Key Management

    1. Nathaniel Wesley Filardo, Giuseppe Ateniese
      Pages 182-198
    2. Chuah Chai Wen, Edward Dawson, Juan Manuel González Nieto, Leonie Simpson
      Pages 199-216
  8. Applied Cryptography

    1. Teng Guo, Feng Liu, ChuanKun Wu
      Pages 217-227
    2. Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi
      Pages 228-244
    3. Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote
      Pages 245-258
  9. Applications II.i: PINs

    1. Johannes Braun, Moritz Horsch, Alexander Wiesmaier
      Pages 259-276
  10. Applications II.ii: Fundamentals (Works-in-Progress)

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012.
The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are oranized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential attacks, oblivious transfer, internet security, key management, applied cryptography, pins, fundamentals, fault attacks, and key recovery.

Keywords

CAPTCHA impossible differential attack linear cryptanalysis oblivious transfer visual cryptography

Editors and affiliations

  • Mark D. Ryan
    • 1
  • Ben Smyth
    • 2
  • Guilin Wang
    • 3
  1. 1.School of Computer ScienceUniversity of BirminghamUK
  2. 2.Toshiba CorporationSaiwai-kuJapan
  3. 3.School of Computer Science & Software EngineeringUniversity of WollongongWollongongAustralia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-29100-5
  • Online ISBN 978-3-642-29101-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349