Advertisement

Information Security Practice and Experience

10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings

  • Xinyi Huang
  • Jianying Zhou

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8434)

Table of contents

  1. Front Matter
  2. Invited Papers from Keynote Speakers

    1. Dieter Gollmann
      Pages 1-7
    2. Michel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache
      Pages 8-14
    3. Javier Lopez, Ruben Rios, Jorge Cuellar
      Pages 15-27
    4. Pierangela Samarati
      Pages 28-41
    5. Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak, Przemysław Kubiak, Łukasz Krzywiecki
      Pages 42-59
  3. Network Security

    1. Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
      Pages 60-74
    2. Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo
      Pages 75-89
    3. Yi Tang, Piaoping Lin, Zhaokai Luo
      Pages 90-104
    4. Pei Li, Jian Mao, Ruilong Wang, Lihua Zhang, Tao Wei
      Pages 105-118
  4. System Security

    1. Chien-Ming Chen, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun
      Pages 119-128
    2. Mehari Msgna, Konstantinos Markantonakis, Keith Mayes
      Pages 129-143
    3. Yonggan Hou, J. W. Zhuge, Dan Xin, Wenya Feng
      Pages 159-171
    4. HongWei Zhou, Xin Wu, WenChang Shi, JinHui Yuan, Bin Liang
      Pages 172-186
  5. Security Practice

    1. Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng
      Pages 187-201
    2. Shujie Cui, Johann Großschädl, Zhe Liu, Qiuliang Xu
      Pages 202-216
    3. Chenyang Tu, Wei He, Neng Gao, Eduardo de la Torre, Zeyi Liu, Limin Liu
      Pages 217-231
    4. Jing Wang, Le Guan, Limin Liu, Daren Zha
      Pages 247-261
    5. Hongmei Liu, Songtao Li, Shan Bian
      Pages 262-270
  6. Security Protocols

  7. Cloud Security

    1. Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu
      Pages 330-345
    2. Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph Liu
      Pages 346-358
    3. Yong Yu, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia
      Pages 359-372
    4. Jiageng Chen, Atsuko Miyaji, Chunhua Su
      Pages 373-387
  8. Digital Signatures

    1. Huaqun Wang, Qianhong Wu, Bo Qin, Futai Zhang, Josep Domingo-Ferrer
      Pages 388-402
    2. Man Ho Au, Willy Susilo
      Pages 403-417
    3. Fei Tang, Hongda Li, Qihua Niu, Bei Liang
      Pages 418-432
    4. Kefeng Wang, Yi Mu, Willy Susilo, Fuchun Guo
      Pages 433-447
  9. Encryption and Key Agreement

    1. Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu
      Pages 448-461
    2. Puwen Wei, Yuliang Zheng, Wei Wang
      Pages 462-480
    3. Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jianwei Liu, WenChang Shi
      Pages 496-510
  10. Theory

    1. Ronglin Hao, Bao Li, Bingke Ma, Xiaoqian Li
      Pages 524-536
    2. Jun Xu, Lei Hu, Zhangjie Huang, Liqiang Peng
      Pages 537-551
    3. Kishan Chand Gupta, Indranil Ghosh Ray
      Pages 564-576
  11. Back Matter

About these proceedings

Introduction

This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.

Keywords

authentication authorization cloud computing digital signature distributed computation encryption network security public key encryption reverse engineering side-channel analysis

Editors and affiliations

  • Xinyi Huang
    • 1
  • Jianying Zhou
    • 2
  1. 1.School of Mathematics and Computer ScienceFujian Normal UniversityFuzhouChina
  2. 2.Infocom Security DepartmentInstitute for Infocomm ResearchSingaporeSingapore

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-06320-1
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-06319-5
  • Online ISBN 978-3-319-06320-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace
Engineering