Information Security

12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings

  • Pierangela Samarati
  • Moti Yung
  • Fabio Martinelli
  • Claudio A. Ardagna
Conference proceedings ISC 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5735)

Table of contents

  1. Front Matter
  2. Analysis Techniques

    1. Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel
      Pages 1-16
    2. Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux
      Pages 17-32
    3. Jens Bender, Marc Fischlin, Dennis Kügler
      Pages 33-48
    4. Amitabh Saxena, Brecht Wyseur, Bart Preneel
      Pages 49-58
    5. Bogdan Groza, Marius Minea
      Pages 59-67
  3. Hash Functions

  4. Database Security and Biometrics

    1. Suvasini Panigrahi, Shamik Sural
      Pages 107-120
    2. Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl
      Pages 135-142
    3. Kaushik Roy, Prabir Bhattacharya
      Pages 143-150
  5. Algebraic Attacks and Proxy Re-Encryption

    1. Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao
      Pages 151-166
    2. Nicolas T. Courtois, Sean O’Neil, Jean-Jacques Quisquater
      Pages 167-176
    3. Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li
      Pages 177-185
  6. Distributed System Security

    1. Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh
      Pages 186-201
    2. Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda
      Pages 202-217
    3. Sebastian Roschke, Feng Cheng, Robert Schuppenies, Christoph Meinel
      Pages 218-233
    4. Hongxia Jin, Serdar Pehlivanoglu
      Pages 234-241
    5. Boris Rozenberg, Ehud Gudes, Yuval Elovici
      Pages 242-249
  7. Identity Management and Authentication

    1. Keith B. Frikken, Marina Blanton, Mikhail J. Atallah
      Pages 262-277
    2. Sebastian Gajek, Jörg Schwenk, Michael Steiner, Chen Xuan
      Pages 278-293
  8. Applied Cryptography

    1. Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert et al.
      Pages 294-309
    2. S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
      Pages 310-325
    3. Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi
      Pages 326-337
    4. Peng Yang, Rui Zhang, Kanta Matsuura, Hideki Imai
      Pages 338-346
  9. Access Control

    1. Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
      Pages 347-362
    2. Yu-Yuan Chen, Ruby B. Lee
      Pages 363-378
    3. Manachai Toahchoodee, Xing Xie, Indrakshi Ray
      Pages 379-394
    4. Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma
      Pages 395-402
    5. Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, Xiaopu Ma
      Pages 403-410
  10. MAC and Nonces

    1. Juan Garay, Vladimir Kolesnikov, Rae McLellan
      Pages 427-442
    2. Kan Yasuda
      Pages 443-458
  11. P2P and Web Services

    1. Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Cliff Stein
      Pages 459-474
    2. Mirco Marchetti, Michele Messori, Michele Colajanni
      Pages 475-490
    3. Matthew Burnside, Angelos D. Keromytis
      Pages 491-506
  12. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009.

The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services.


access control algebraic attacks anonymity applied cryptography authentication behavior-based detection biometrics block ciphers boolean function collision attacks cryptographic algorithms cryptographic pr cryptography distributed systems hash function

Editors and affiliations

  • Pierangela Samarati
    • 1
  • Moti Yung
    • 2
  • Fabio Martinelli
    • 3
  • Claudio A. Ardagna
    • 4
  1. 1.Dipartimento di Tecnologie dell’ InformazioneUniversità degli Studi di MilanoCremaItaly
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA
  3. 3.Information Security Group, Pisa Research AreaIstituto di Informatica e Telematica - IIT Consiglio Nazionale delle Ricerche - C.N.R.PisaItaly
  4. 4.Dipartimento di Tecnologie dell’InformazioneUniversità degli Studi di MilanoCremaItaly

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-04473-1
  • Online ISBN 978-3-642-04474-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site