Information Security

7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004. Proceedings

  • Kan Zhang
  • Yuliang Zheng
Conference proceedings ISC 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3225)

Table of contents

  1. Front Matter
  2. Key Management

  3. Digital Signatures

    1. Michael Backes, Birgit Pfitzmann, Michael Waidner
      Pages 39-51
    2. Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater
      Pages 52-60
  4. New Algorithms

    1. Craig Gentry, Zulfikar Ramzan
      Pages 73-86
    2. Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
      Pages 87-98
    3. Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu
      Pages 99-110
  5. Cryptanalysis

    1. Raphael C. -W. Phan, Helena Handschuh
      Pages 111-122
    2. Guilin Wang, Robert H. Deng, DongJin Kwak, SangJae Moon
      Pages 123-133
    3. Carlisle Adams, Guenther Kramer, Serge Mister, Robert Zuccherato
      Pages 134-145
  6. Intrusion Detection

    1. Zouheir Trabelsi, Hamza Rahmani
      Pages 170-182
    2. Mark Foster, Joseph N. Wilson, Shigang Chen
      Pages 183-194
    3. Elisa Bertino, Teodoro Leggieri, Evimaria Terzi
      Pages 195-206
  7. Access Control

    1. Elisa Bertino, Elena Ferrari, Giovanni Mella
      Pages 207-218
    2. Dimitar P. Guelev, Mark Ryan, Pierre Yves Schobbens
      Pages 219-230
    3. Ajay Chander, Drew Dean, John Mitchell
      Pages 231-244
  8. Human Authentication

    1. Richard Bergmair, Stefan Katzenbeisser
      Pages 257-267
    2. Monica Chew, J. D. Tygar
      Pages 268-279
  9. Certificate Management

    1. Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
      Pages 280-291
    2. Qinglin Jiang, Douglas S. Reeves, Peng Ning
      Pages 292-303
  10. Mobile and Ad Hoc Security

    1. Ke Xu, Stephen R. Tate
      Pages 304-317
    2. Jukka Ylitalo, Jan Melén, Pekka Nikander, Vesa Torvinen
      Pages 318-329
    3. Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang
      Pages 330-341
  11. Web Security

    1. Marcin Gomułkiewicz, Marek Klonowski, Mirosław Kutyłowski
      Pages 354-366
    2. Toru Nakanishi, Mitsuaki Shiota, Yuji Sugiyama
      Pages 367-378
  12. Digital Rights Management

    1. Heejae Park, Jong Kim
      Pages 379-390
    2. Ginger Myles, Christian Collberg
      Pages 404-415
  13. Software Security

    1. Thitima Srivatanakul, John A. Clark, Fiona Polack
      Pages 416-427
    2. Kelly Heffner, Christian Collberg
      Pages 428-440
  14. Back Matter

About these proceedings


The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend c- tinuedintheprogramofthisyear’sconference.Theprogramcommitteereceived 106 submissions, from which 36 were selected for presentation. Each submission was reviewed by at least three experts in the relevant research area. We would liketothankalltheauthorsfortakingtheirtimetopreparethesubmissions,and wehopethatthosewhosepapersweredeclinedwillbeableto?ndanalternative forum for their work. We were fortunate to have an energetic team of experts who took on the task of the program committee. Their names may be found overleaf, and we thank them warmly for their time and e?orts. This team was helped by an even larger number of external reviewers who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete. We would also like to thank the advisory committee for their advice and s- port.TheexcellentlocalarrangementswerehandledbyDirkBalfanzandJessica Staddon. We made use of the electronic submission and reviewing software s- plied by COSIC at the Katholieke Universiteit Leuven. Both the software and the ISC 2004 website were run on a server at UNC Charlotte, and were perfectly maintained by Seung-Hyun Im. We also appreciate assistance from Lawrence Teo in editing the proceedings.


Information RSA Smart Card algorithms anonymity data security digital payment digital signature schemes network security person authentication privacy secure communications security systems security trust

Editors and affiliations

  • Kan Zhang
    • 1
  • Yuliang Zheng
    • 2
  1. 1.Institute of psychologyChinese Academy of SciencesBeijingP.R. China
  2. 2.Department of Software & Information SystemsThe University of North Carolina at CharlotteCharlotteUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-23208-7
  • Online ISBN 978-3-540-30144-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software