Advertisement

Information Security

15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings

  • Dieter Gollmann
  • Felix C. Freiling

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7483)

Table of contents

  1. Front Matter
  2. Invited Paper

    1. Manas Pathak, Jose Portelo, Bhiksha Raj, Isabel Trancoso
      Pages 1-22
  3. Cryptography and Cryptanalysis

    1. Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer
      Pages 23-38
    2. Bogdan Groza, Bogdan Warinschi
      Pages 39-54
  4. Mobility

    1. Sanna Suoranta, André Andrade, Tuomas Aura
      Pages 70-85
    2. Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot
      Pages 86-103
  5. Cards and Sensors

  6. Software Security

    1. Lei Zhao, Debin Gao, Lina Wang
      Pages 151-167
    2. Sami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden, Mira Mezini, Stefan Katzenbeisser
      Pages 168-187
    3. Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang et al.
      Pages 188-203
  7. Processing Encrypted Data

    1. Michael Clear, Karl Reid, Desmond Ennis, Arthur Hughes, Hitesh Tewari
      Pages 204-223
    2. Christoph Bösch, Qiang Tang, Pieter Hartel, Willem Jonker
      Pages 224-241
    3. Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser
      Pages 242-257
  8. Authentication and Identification

    1. Atsushi Fujioka, Taiichi Saito, Keita Xagawa
      Pages 258-273
  9. New Directions in Access Control

    1. Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang
      Pages 290-305
    2. Peter Drábik, Fabio Martinelli, Charles Morisset
      Pages 306-321
    3. Nezar Nassr, Nidal Aboudagga, Eric Steegmans
      Pages 322-337
  10. GPU for Security

    1. Johannes Gilger, Johannes Barnickel, Ulrike Meyer
      Pages 338-353
  11. Models for Risk and Revocation

    1. Lisa Rajbhandari, Einar Snekkenes
      Pages 370-386
    2. Carlos Gañán, Jorge Mata-Díaz, Jose L. Muñoz, Oscar Esparza, Juanjo Alins
      Pages 387-400
  12. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012.
The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.

Keywords

RSA cryptosystem cloud security elliptic curves post-quantum cryptography searchable encryption

Editors and affiliations

  • Dieter Gollmann
    • 1
  • Felix C. Freiling
    • 2
  1. 1.Institute of Security in Distributed ApplicationsUniversity of TechnologyHamburgGermany
  2. 2.Department of Computer ScienceUniversity of Erlangen-NürnbergErlangenGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-33383-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-33382-8
  • Online ISBN 978-3-642-33383-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering