Information Security Practice and Experience

11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings

  • Javier Lopez
  • Yongdong Wu
Conference proceedings ISPEC 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9065)

Also part of the Security and Cryptology book sub series (LNSC, volume 9065)

Table of contents

  1. Front Matter
    Pages 1-14
  2. System Security

    1. Front Matter
      Pages 1-1
    2. Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng
      Pages 3-17
  3. Stream cipher I

    1. Front Matter
      Pages 33-33
    2. Riham AlTawy, Amr M. Youssef
      Pages 35-49
    3. Shaoyu Du, Bin Zhang, Zhenqi Li, Dongdai Lin
      Pages 50-64
    4. Lin Ding, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, Wei Zhao
      Pages 65-75
  4. Analysis

    1. Front Matter
      Pages 77-77
    2. Xiaochao Sun, Bao Li, Xianhui Lu
      Pages 79-95
    3. Liqiang Peng, Lei Hu, Zhangjie Huang, Jun Xu
      Pages 96-108
    4. Weixuan Li, Wei Yu, Kunpeng Wang
      Pages 109-120
    5. Fariba Haddadi, Duc Le Cong, Laura Porter, A. Nur Zincir-Heywood
      Pages 121-135
  5. Key Exchange Protocol

    1. Front Matter
      Pages 137-137
    2. Baoping Tian, Fushan Wei, Chuangui Ma
      Pages 139-153
  6. Elliptic Curve Cryptography

    1. Front Matter
      Pages 169-169
    2. Song Tian, Wei Yu, Bao Li, Kunpeng Wang
      Pages 171-180
    3. Song Tian, Wei Yu, Bao Li, Kunpeng Wang
      Pages 181-191
    4. Yang Sun, Qianhong Wu, Bo Qin, Yujue Wang, Jianwei Liu
      Pages 192-206
  7. Stream Cipher II

    1. Front Matter
      Pages 207-207
    2. Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan et al.
      Pages 209-219
    3. Chun Guo, Hailong Zhang, Dongdai Lin
      Pages 220-234
    4. Shaoyu Du, Zhenqi Li, Bin Zhang, Dongdai Lin
      Pages 235-249
  8. Authentication

    1. Front Matter
      Pages 251-251
    2. Erick Bauman, Yafeng Lu, Zhiqiang Lin
      Pages 253-267
    3. Michael Velten, Peter Schneider, Sascha Wessel, Claudia Eckert
      Pages 268-282
  9. Attribute-Based Encryption

    1. Front Matter
      Pages 299-299
    2. Jianghong Wei, Xinyi Huang, Xuexian Hu, Wenfen Liu
      Pages 316-330
    3. Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
      Pages 331-345
  10. Mobile Security

    1. Front Matter
      Pages 347-347
    2. Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, Dengguo Feng
      Pages 349-364
    3. Craig Sanders, Ayush Shah, Shengzhi Zhang
      Pages 365-377
    4. Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang
      Pages 378-392
  11. Theory

    1. Front Matter
      Pages 393-393
    2. Dibyendu Roy, Ankita Chaturvedi, Sourav Mukhopadhyay
      Pages 395-405
    3. Qingbin Wang, Shaozhen Chen, Aijun Ge
      Pages 406-420
    4. Lucjan Hanzlik, Mirosław Kutyłowski, Moti Yung
      Pages 421-436
  12. Implementation

    1. Front Matter
      Pages 437-437
    2. Wei Zhang, Yu Zhang
      Pages 439-453
    3. Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen
      Pages 454-468
    4. Guangjun Fan, Yongbin Zhou, François-Xavier Standaert, Dengguo Feng
      Pages 469-484
    5. Yunya Zhou, Jianwei Liu, Hua Deng, Bo Qin, Lei Zhang
      Pages 485-498
    6. Clémentine Gritti, Willy Susilo, Thomas Plantard
      Pages 499-513
    7. Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini
      Pages 514-529
  13. Privay and Indistinguishability

    1. Front Matter
      Pages 531-531
    2. Liang Cheng, Shaoyin Cheng, Fan Jiang
      Pages 533-547
    3. Jina Kang, Hyoungshick Kim, Yun Gyung Cheong, Jun Ho Huh
      Pages 548-558

About these proceedings


This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015.
The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.


Authentication Authorization Cloud computing Database and storage security Digital signature Distributed computation Encryption Information security Key management Mathematical foundations of cryptography Network security Public key encryption Reverse engineering Security and privacy Security in hardware Security services Side-channel analysis Stream cyphers Symmetric cryptography and hash functions Systems security

Editors and affiliations

  • Javier Lopez
    • 1
  • Yongdong Wu
    • 2
  1. 1.University of MalagaMalagaSpain
  2. 2.Institute for Infocomm ResearchSingaporeSingapore

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-17532-4
  • Online ISBN 978-3-319-17533-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment