© 2009

Information Security Practice and Experience

5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings

  • Feng Bao
  • Hui Li
  • Guilin Wang
Conference proceedings ISPEC 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5451)

Table of contents

  1. Front Matter
  2. Public Key Encryption

    1. Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker
      Pages 1-12
    2. Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi
      Pages 13-23
    3. Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou
      Pages 24-34
  3. Digital Signatures

  4. System Security

    1. Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Farley, Xuxian Jiang
      Pages 59-70
    2. Xianggen Wang, Dengguo Feng, Purui Su
      Pages 71-82
    3. Xinsong Wu, Zhouyi Zhou, Yeping He, Hongliang Liang
      Pages 83-92
  5. Applied Cryptography

    1. Guifang Huang, Dongdai Lin, Yanshuo Zhang
      Pages 93-101
    2. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
      Pages 112-123
    3. Qi Cheng, Yong Yin, Kun Xiao, Ching-Fang Hsu
      Pages 124-135
  6. Multimedia Security and DRM

    1. Hongxia Jin, Jeffrey Lotspiech
      Pages 147-158
    2. Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won
      Pages 159-170
  7. Security Protocols

    1. Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister, Arne-Kristian Groven
      Pages 171-182
    2. Xiaojuan Cai, Yonggen Gu
      Pages 183-194
    3. Kun Peng
      Pages 195-206
  8. Key Exchange and Management

About these proceedings


This book constitutes the refereed proceedings of the 5th International Information Security Practice and Experience Conference, ISPEC 2009, held in Xi'an, China in April 2009.

The 34 revised full papers were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on public key encryption, digital signatures, system security, applied cryptography, multimedia security and DRM, security protocols, key exchange and management, hash functions and MACs, cryptanalysis, network security as well as security applications.


Information RFID RSA Trusted Computing VoIP access control anonymity e-Voting intrusion detection networks pairing particle swarm privacy security trust

Editors and affiliations

  • Feng Bao
    • 1
  • Hui Li
    • 2
  • Guilin Wang
    • 3
  1. 1.Institute for Infocomm Research (I<Superscript>2</Superscript>R) 1South TowerSingapore
  2. 2.School of Telecommunications EngineeringXidian UniversityXi’an, ShaanxiP. R. China
  3. 3.School of Computer ScienceUniversity of Birmingham Homepage:

Bibliographic information

  • Book Title Information Security Practice and Experience
  • Book Subtitle 5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings
  • Editors Feng Bao
    Hui Li
    Guilin Wang
  • Series Title Lecture Notes in Computer Science
  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Softcover ISBN 978-3-642-00842-9
  • eBook ISBN 978-3-642-00843-6
  • Series ISSN 0302-9743
  • Series E-ISSN 1611-3349
  • Edition Number 1
  • Number of Pages XIV, 410
  • Number of Illustrations 0 b/w illustrations, 0 illustrations in colour
  • Topics Systems and Data Security
    Computer Communication Networks
    Computers and Society
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment