Information Security Practice and Experience

Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006. Proceedings

  • Kefei Chen
  • Robert Deng
  • Xuejia Lai
  • Jianying Zhou
Conference proceedings ISPEC 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3903)

Table of contents

  1. Front Matter
  2. Cryptoanalysis

    1. Min Feng, Bin B. Zhu, Cunlai Zhao, Shipeng Li
      Pages 13-24
    2. Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim
      Pages 33-44
  3. Network Security I

    1. Hao Luo, Binxing Fang, Xiaochun Yun
      Pages 45-56
    2. Ping Wang, Binxing Fang, Xiaochun Yun
      Pages 57-66
    3. Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi
      Pages 67-77
  4. Network Security II

    1. Feng Xie, Shuo Bai
      Pages 78-89
    2. Ji Wu, Chaoqun Ye, Shiyao Jin
      Pages 90-99
    3. Zhifei Tao, Hai Jin, Zongfen Han, En Cheng
      Pages 100-111
    4. Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu
      Pages 112-122
  5. Security Protocol

    1. Xiehua Li, Shutang Yang, Jianhua Li, Hongwen Zhu
      Pages 123-133
    2. Xiao Li, Mingxing He
      Pages 134-141
    3. Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu
      Pages 142-152
  6. Communication Security

    1. Jung Wook Lee, Yong Ho Hwang, Pil Joong Lee
      Pages 153-164
    2. Ling Dong, Kefei Chen
      Pages 165-176
    3. Jinye Peng, Guangqiang He, Jin Xiong, Guihua Zeng
      Pages 177-186
  7. Signature and Key Agreement

    1. Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
      Pages 187-201
    2. Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
      Pages 202-213
    3. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
      Pages 214-225
    4. Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
      Pages 226-234
  8. Application I

    1. Hyung Chan Kim, Wook Shin, R. S. Ramakrishna, Kouichi Sakurai
      Pages 235-247
    2. Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou
      Pages 248-259
  9. Application II

    1. Yahui Lu, Li Zhang, Yinbo Liu, Jiaguang Sun
      Pages 278-289
    2. Fangyong Hou, Hongjun He, Zhiying Wang, Kui Dai
      Pages 290-301
    3. Hongxia Jin, Jeffery Lotspiech
      Pages 302-313
  10. Cryptographic Techniques

    1. Tianjie Cao, Xianping Mao, Dongdai Lin
      Pages 314-320
    2. Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin
      Pages 321-331
    3. Lan Zhou, Willy Susilo, Yi Mu
      Pages 332-342
  11. System Security

    1. Haibin Shen, Jimin Wang, Lingdi Ping, Kang Sun
      Pages 343-354
    2. Fenlin Liu, Bin Lu, Xiangyang Luo
      Pages 355-366
    3. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
      Pages 367-378
    4. Seok Yun Lee, Tai-Myung Chung, Myeonggil Choi
      Pages 379-389
  12. Back Matter

About these proceedings


This volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference 2006 (ISPEC 2006), which took place in Hangzhou, China, April 11–14, 2006. The inaugural ISPEC 2005 was held exactly one year earlier in Singapore. As applications of information security technologies become pervasive, issues pertaining to their deployment and operations are becoming increasingly imp- tant. ISPEC is an annual conference that brings together researchers and pr- titioners to provide a con?uence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. ISPEC 2006 received 307 submissions. This is probably the highest number of paper submissions in any information security-related technical conferences. Due to this exceptionally large number of submissions and the high quality of the submitted papers, not all the papers that contained innovative ideas could be accepted. Each paper was sent to at least three Program Committee m- bers for comments. Based on the reviewers’ comments and discussion by the Program Committee, of the 307 submissions, 35 were selected for inclusion in these proceedings as research track papers and another 21 papers were selected as industrial track papers and are published in the Journal of Shanghai Jiaotong University (Science).


AES Administration DOM Information Monitor RSA authentication cryptanalysis cryptographic hardware data security finite field arithmetic identity privacy security protocol trust

Editors and affiliations

  • Kefei Chen
    • 1
  • Robert Deng
    • 2
  • Xuejia Lai
    • 1
  • Jianying Zhou
    • 3
  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina
  2. 2.Singapore Management University (SMU)Singapore
  3. 3.Cryptography and Security Department Institute for Infocomm ResearchSingapore

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-33052-3
  • Online ISBN 978-3-540-33058-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software