Advertisement

Information Security Practice and Experience

4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings

  • Editors
  • Liqun Chen
  • Yi Mu
  • Willy Susilo

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4991)

Table of contents

  1. Front Matter
  2. Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang
    Pages 14-28
  3. Frederik Armknecht, Alberto N. Escalante B., Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi
    Pages 29-44
  4. Raylin Tso, Takeshi Okamoto, Eiji Okamoto
    Pages 45-55
  5. Qiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval
    Pages 56-70
  6. Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang
    Pages 71-85
  7. Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere
    Pages 86-100
  8. Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma
    Pages 131-145
  9. Patrick P. Tsang, Sean W. Smith
    Pages 146-160
  10. André Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan
    Pages 161-175
  11. Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim
    Pages 176-187
  12. Patrick P. Tsang, Sean W. Smith
    Pages 188-202
  13. Minjin Kwon, Kyoochang Jeong, Heejo Lee
    Pages 203-217
  14. Quoc-Cuong Le, Patrick Bellot, Akim Demaille
    Pages 218-232
  15. Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu
    Pages 248-262
  16. Khaled Ouafi, Raphael C. -W. Phan
    Pages 263-277
  17. Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
    Pages 290-303
  18. Jin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk
    Pages 319-333
  19. Shaik Maleka, Amjed Shareef, C. Pandu Rangan
    Pages 334-346
  20. Qingsong Ye, Huaxiong Wang, Josef Pieprzyk
    Pages 347-360
  21. David Galindo, Flavio D. Garcia, Peter van Rossum
    Pages 361-376
  22. Wen Ji, Lei Hu
    Pages 377-391
  23. Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu
    Pages 392-403
  24. Danilo Gligoroski, Suzana Andova, Svein Johan Knapskog
    Pages 404-418
  25. Back Matter

About these proceedings

Keywords

Code Denial of Service Distributed Denial of Service RSA Radio-Frequency Identification (RFID) access control algorithms data security elliptic curves finite field arithmetic hardware security information security intrusion det privacy trust

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-79104-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-79103-4
  • Online ISBN 978-3-540-79104-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace
Engineering