Information Security and Cryptology

4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers

  • Moti Yung
  • Peng Liu
  • Dongdai Lin
Conference proceedings Inscrypt 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5487)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Digital Signature and Signcryption Schemes

    1. Wei Zhao, Changlu Lin, Dingfeng Ye
      Pages 23-40
    2. Huaqun Wang, Hong Yu
      Pages 41-46
    3. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
      Pages 47-59
  4. Privacy and Anonymity

    1. Rui Zhang, Hideki Imai
      Pages 60-71
    2. Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
      Pages 72-83
    3. Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
      Pages 84-95
  5. Message Authentication Code and Hash Function

    1. Peng Wang, Dengguo Feng, Changlu Lin, Wenling Wu
      Pages 96-114
    2. Luk Bettale, Jean-Charles Faugère, Ludovic Perret
      Pages 115-124
  6. Secure Protocols

    1. Kun Peng, Feng Bao
      Pages 141-156
  7. Symmetric Cryptography

    1. Debra L. Cook, Moti Yung, Angelos Keromytis
      Pages 157-180
    2. Wenying Zhang, Jing Han
      Pages 181-191
    3. Guang Zeng, Yang Yang, Wenbao Han, Shuqin Fan
      Pages 192-200
  8. Certificateless Cryptography

    1. Xu an Wang, Xinyi Huang, Xiaoyuan Yang
      Pages 217-239
  9. Hardware Implementation and Side Channel Attack

  10. Wireless Network Security

    1. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
      Pages 289-304
  11. Public Key and Identity Based Cryptography

    1. Ningbo Mu, Yupu Hu, Leyou Zhang
      Pages 305-313
    2. Qiang Tang, Pieter Hartel, Willem Jonker
      Pages 332-347
  12. Access Control and Network Security

    1. Zonghua Zhang, Ruo Ando, Youki Kadobayashi
      Pages 348-369
    2. Lingli Deng, Yeping He, Ziyao Xu
      Pages 370-388
  13. Trusted Computing and Applications

    1. Ziyao Xu, Yeping He, Lingli Deng
      Pages 389-405
    2. Tong-Lee Lim, Tieyan Li, Yingjiu Li
      Pages 406-424
  14. Back Matter

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008.

The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.


Public Key Trusted Computing anonymity code cryptography data security identity information privacy security trust

Editors and affiliations

  • Moti Yung
    • 1
  • Peng Liu
    • 2
  • Dongdai Lin
    • 3
  1. 1.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew York, NYUSA
  2. 2.College of Information Sciences and TechnologyPennsylvania State UniversityUniversity ParkUSA
  3. 3.SKLOIS, Institute of SoftwareChinese Academy of SciencesBeijingChina

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-01439-0
  • Online ISBN 978-3-642-01440-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Finance, Business & Banking