© 2019

Information Security

22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings

  • Zhiqiang Lin
  • Charalampos Papamanthou
  • Michalis Polychronakis
Conference proceedings ISC 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11723)

Also part of the Security and Cryptology book sub series (LNSC, volume 11723)

Table of contents

  1. Front Matter
    Pages i-xi
  2. Attacks and Cryptanalysis

    1. Front Matter
      Pages 1-1
    2. Junming Ke, Pawel Szalachowski, Jianying Zhou, Qiuliang Xu, Zheng Yang
      Pages 3-24
    3. Evangelia Anna Markatou, Roberto Tamassia
      Pages 25-43
    4. Jingchun Yang, Meicheng Liu, Dongdai Lin
      Pages 44-64
  3. Crypto I: Secure Computation and Storage

    1. Front Matter
      Pages 65-65
    2. Iraklis Leontiadis, Reza Curtmola
      Pages 67-86
    3. Chloé Hébant, Duong Hieu Phan, David Pointcheval
      Pages 87-106
    4. Bei Liang, Aikaterini Mitrokotsa
      Pages 107-126
  4. Machine Learning and Security

    1. Front Matter
      Pages 127-127
    2. Apostolis Zarras, Ilias Gerostathopoulos, Daniel Méndez Fernández
      Pages 129-148
    3. Maksim Tsikhanovich, Malik Magdon-Ismail, Muhammad Ishaq, Vassilis Zikas
      Pages 149-167
  5. Crypto II: Zero-Knowledge Proofs

    1. Front Matter
      Pages 169-169
    2. Carlo Brunetta, Bei Liang, Aikaterini Mitrokotsa
      Pages 171-189
    3. Yanhua Zhang, Yupu Hu, Qikun Zhang, Huiwen Jia
      Pages 190-208
  6. Defenses

    1. Front Matter
      Pages 209-209
    2. Arash Alavi, Rajiv Gupta, Zhiyun Qian
      Pages 211-230
    3. Evangelia Anna Markatou, Roberto Tamassia
      Pages 231-251
  7. Web Security

    1. Front Matter
      Pages 253-253
    2. Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William Robertson, Engin Kirda
      Pages 255-276

About these proceedings


This book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019.

The 23 full papers presented in this volume were carefully reviewed and selected from 86 submissions. The papers were organized in topical sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security;  Crypto II: Zero-Knowledge Proofs; Defenses; Web Security; Side Channels;  Malware Analysis; Crypto III: Signatures and Authentication.


artificial intelligence authentication cryptographic protocols data mining data privacy data security data/system integrity distributed computer systems economics of security and privacy formal methods in security internet machine learning network security privacy public key cryptography secure cloud computing security in information flow security in location services software engineering World Wide Web

Editors and affiliations

  • Zhiqiang Lin
    • 1
  • Charalampos Papamanthou
    • 2
  • Michalis Polychronakis
    • 3
  1. 1.The Ohio State UniversityColumbusUSA
  2. 2.University of MarylandCollege ParkUSA
  3. 3.Stony Brook UniversityStony BrookUSA

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment