Skip to main content
  • Conference proceedings
  • © 2011

Information Security and Assurance

International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011, Proceedings

  • up-to-date results
  • fast track conference proceedings
  • state-of-the-art report

Conference proceedings info: ISA 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (43 papers)

  1. Front Matter

  2. Information Security Awareness Campaign: An Alternate Approach

    • Bilal Khan, Khaled S. Alghathbar, Muhammad Khurram Khan
    Pages 1-10
  3. Recent Progress in Code-Based Cryptography

    • Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, Mohammed Meziani, Robert Niebuhr
    Pages 21-32
  4. GPU Implementation of the Keccak Hash Function Family

    • Pierre-Louis Cayrel, Gerhard Hoffmann, Michael Schneider
    Pages 33-42
  5. Secret Key Awareness Security Public Key Encryption Scheme

    • Guoyan Zhang, Qiuliang Xu
    Pages 53-61
  6. Using SAT Solving to Improve Differential Fault Analysis of Trivium

    • Mohamed Saied Emam Mohamed, Stanislav Bulygin, Johannes Buchmann
    Pages 62-71
  7. Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis

    • Lukáš ÄŽurfina, Jakub KÅ™oustek, Petr Zemek, DuÅ¡an Kolář, Tomáš HruÅ¡ka, Karel Masařík et al.
    Pages 72-86
  8. Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems

    • Fabio Manganiello, Mirco Marchetti, Michele Colajanni
    Pages 101-110
  9. 2SC: An Efficient Code-Based Stream Cipher

    • Mohammed Meziani, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui
    Pages 111-122
  10. Towards Algebraic Cryptanalysis of HFE Challenge 2

    • Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann
    Pages 123-131
  11. S-FSB: An Improved Variant of the FSB Hash Family

    • Mohammed Meziani, Özgür Dagdelen, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui
    Pages 132-145
  12. Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes

    • Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Meziani Mohammed
    Pages 146-155
  13. A Detrministic Factorization and Primality Testing Algorithm for Integers of the Form Z Mod 6 = -1

    • Noureldien Abdelrhman Noureldien, Mahmud Awadelkariem, DeiaEldien M. Ahmed
    Pages 156-165
  14. Lower Bounds for Interpolating Polynomials for Square Roots of the Elliptic Curve Discrete Logarithm

    • Gerasimos C. Meletiou, Yannis C. Stamatiou, Apostolos Tsiakalos
    Pages 177-187
  15. Towards Next Generation System Architecture for Emergency Services

    • Jari Veijalainen, Veikko Hara
    Pages 188-202

Other Volumes

  1. Information Security and Assurance

About this book

This book constitutes the proceedings of the International Conference on Information Security and Assurance, held in Brno, Czech Republic in August 2011.

Editors and Affiliations

  • Hannam University, Daejeon, South Korea

    Tai-hoon Kim

  • The Ohio State University, Columbus, USA

    Hojjat Adeli

  • Hannam University, Daejeon, Korea

    Rosslin John Robles, Maricel Balitanas

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access