Information Security and Cryptology

First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005. Proceedings

  • Dengguo Feng
  • Dongdai Lin
  • Moti Yung
Conference proceedings CISC 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3822)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Identity Based Cryptography

    1. Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong
      Pages 53-62
  4. Security Modelling

    1. Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
      Pages 63-74
    2. Xiaolan Zhang, Brian King
      Pages 75-90
  5. Systems Security

    1. Roman Schlegel, Serge Vaudenay
      Pages 91-100
  6. Signature Schemes

    1. Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang
      Pages 128-139
    2. Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
      Pages 150-161
  7. Symmetric Key Mechanisms

    1. Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz
      Pages 162-174
    2. Peng Wang, Dengguo Feng, Wenling Wu
      Pages 175-188
    3. Jihong Teng, Shiqu Li, Xiaoying Huang
      Pages 189-201
    4. Shimin Wei, Guolong Chen, Guozhen Xiao
      Pages 202-209
  8. Zero-Knowledge and Secure Computations

    1. Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
      Pages 221-232
  9. Threshold Cryptography

  10. Intrusion Detection Systems

    1. Gil-Jong Mun, Yong-Min Kim, DongKook Kim, Bong-Nam Noh
      Pages 254-264
    2. Chang-Joo Moon, Woojin Paik, Young-Gab Kim, Ju-Hum Kwon
      Pages 265-278
    3. Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim
      Pages 279-289
  11. Protocol Cryptanalysis

    1. Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu
      Pages 290-301
    2. Fei Gao, Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu
      Pages 302-312
  12. ECC Algorithms

    1. Cheol Min Park, Myung Hwan Kim, Moti Yung
      Pages 313-323
  13. Applications

    1. Jong-Hyuk Roh, Kyoon-Ha Lee
      Pages 336-345
    2. Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song
      Pages 346-357
    3. Yongwha Chung, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, Dosung Ahn
      Pages 358-369
  14. Secret Sharing

  15. Denial of Service Attacks

    1. Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura
      Pages 395-406
  16. Back Matter

About these proceedings


The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer’s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions.


authentication bluetooth security cryptanalysis cryptographic protocols cryptography dos attacks error-correcting code information intrusion detection secure computation secure proxy security modeling signature schemes systems security threshold cryptography

Editors and affiliations

  • Dengguo Feng
    • 1
  • Dongdai Lin
    • 2
  • Moti Yung
    • 3
  1. 1.State Key Laboratory of Information SecurityInstitution of Software of Chinese Academy of SciencesBeijingChina
  2. 2.SKLOIS Lab, Institute of SoftwareChinese Academy of SciencesBeijingP.R. China
  3. 3.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking