Information Security

13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers

  • Mike Burmester
  • Gene Tsudik
  • Spyros Magliveras
  • Ivana Ilić
Conference proceedings ISC 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6531)

Table of contents

  1. Front Matter
  2. Attacks and Analysis

    1. Kota Ideguchi, Elmar Tischhauser, Bart Preneel
      Pages 1-16
    2. Yi Lu, Yvo Desmedt
      Pages 17-23
    3. Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang
      Pages 24-30
    4. Nadhem J. AlFardan, Kenneth G. Paterson
      Pages 31-38
  3. Analysis

    1. Elena Andreeva, Bart Mennink, Bart Preneel
      Pages 39-53
    2. Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Tereza C. M. B. Carvalho
      Pages 69-83
  4. Authentication, PIR and Content Identification

    1. Christian Wachsmann, Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter
      Pages 84-98
    2. Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow
      Pages 99-113
    3. Yali Liu, Ahmad-Reza Sadeghi, Dipak Ghosal, Biswanath Mukherjee
      Pages 129-135
  5. Privacy

    1. Georg Neugebauer, Ulrike Meyer, Susanne Wetzel
      Pages 136-151
    2. Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede
      Pages 159-165
  6. Malware, Crimeware and Code Injection

    1. Zhi Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie
      Pages 181-195
    2. Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis
      Pages 196-202
    3. Elias Athanasopoulos, Antonis Krithinakis, Evangelos P. Markatos
      Pages 203-209
  7. Intrusion Detection

    1. Lei Wei, Michael K. Reiter, Ketan Mayer-Patel
      Pages 210-225
    2. Natalia Stakhanova, Hanli Ren, Ali A. Ghorbani
      Pages 226-240
    3. Davidson R. Boccardo, Tiago M. Nascimento, Raphael C. Machado, Charles B. Prado, Luiz F. R. C. Carmo
      Pages 241-253
  8. Side Channels

    1. Jorge Guajardo, Bart Mennink
      Pages 254-268
    2. Geir Olav Dyrkolbotn, Knut Wold, Einar Snekkenes
      Pages 269-275
  9. Cryptography

    1. Julien Cathalo, Christophe Petit
      Pages 283-298
    2. Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, Anderson C. A. Nascimento
      Pages 299-306
    3. Ping Yu, Rui Xue
      Pages 307-318
    4. Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo
      Pages 319-330
  10. Smartphones

    1. Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo
      Pages 331-345
    2. Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy
      Pages 346-360
  11. Biometrics

    1. Bendik B. Mjaaland, Patrick Bours, Danilo Gligoroski
      Pages 361-380
  12. Cryptography, Application

    1. Kun Peng, Feng Bao
      Pages 381-393
    2. Patricia Everaere, Isabelle Simplot-Ryl, Issa Traoré
      Pages 394-408
  13. Buffer Overflow

    1. Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu
      Pages 409-415
  14. Cryptography, Theory

  15. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held in Boca Raton, FL, USA, in October 2010.

The 25 revised full papers and the 11 short papers presented were carefully reviewed and selected from 117 submissions. The papers are organized in topical sections on attacks and analysis; analysis; authentication, PIR and content identification; privacy; malware, crimeware and code injection; intrusion detection; side channels; cryptography; smartphones; biometrics; cryptography, application; buffer overflow; and cryptography, theory.


DNS SHA-3 access control anonymity authentication biometrics block ciphers classification collision attacks cryptanalysis cryptographic algorithms cryptographic protocols data structure denial of service digital rights management digital signature e-commerce hash function malware network security peer-to-peer privacy security side-channel attacks spyware stream cipher trusted computing usability

Editors and affiliations

  • Mike Burmester
    • 1
  • Gene Tsudik
    • 2
  • Spyros Magliveras
    • 3
  • Ivana Ilić
    • 4
  1. 1.Center for Security and Assurance in IT (C-SAIT), Department of Computer ScienceFlorida State UniversityTallahasseeUSA
  2. 2.Department of Computer ScienceUniversity of California, IrvineUSA
  3. 3.Center for Cryptology and Information Security (CCIS), Department of Mathematical SciencesFlorida Atlantic UniversityBoca RatonUSA
  4. 4.Mathematical Sciences DepartmentFlorida Atlantic UniversityBoca RatonUSA

Bibliographic information

Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment