Skip to main content
  • Conference proceedings
  • © 2011

Information Security Practice and Experience

7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings

Editors:

  • Fast track conference proceedings
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6672)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISPEC: International Conference on Information Security Practice and Experience

Conference proceedings info: ISPEC 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

  2. Public Key Encryption

    1. Encryption Simulatability Reconsidered

      • Yamin Liu, Bao Li, Xianhui Lu, Xiaoying Jia
      Pages 14-23
    2. Fully Secure Cipertext-Policy Hiding CP-ABE

      • Junzuo Lai, Robert H. Deng, Yingjiu Li
      Pages 24-39
  3. Security Applications

    1. Privacy Enhanced Access Control by Means of Policy Blinding

      • Saeed Sedghi, Pieter Hartel, Willem Jonker, Svetla Nikova
      Pages 108-122
    2. Policy-Based Authentication for Mobile Agents

      • Yikai Wang, Yi Mu, Minjie Zhang
      Pages 123-137
    3. Lightweight Delegated Subset Test with Privacy Protection

      • Xuhua Zhou, Xuhua Ding, Kefei Chen
      Pages 138-151
  4. Post-quantum Cryptography and Side-Channel Attack

    1. Improving BDD Cryptosystems in General Lattices

      • Michael Rose, Thomas Plantard, Willy Susilo
      Pages 152-167
    2. Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme

      • Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin
      Pages 168-180
    3. A Novel Group Signature Scheme Based on MPKC

      • Guangdong Yang, Shaohua Tang, Li Yang
      Pages 181-195
    4. How to Characterize Side-Channel Leakages More Accurately?

      • Jiye Liu, Yongbin Zhou, Yang Han, Jiantang Li, Shuguo Yang, Dengguo Feng
      Pages 196-207
  5. Block Ciphers and MACs

    1. BCBC: A More Efficient MAC Algorithm

      • Bo Liang, Wenling Wu, Liting Zhang
      Pages 233-246
    2. On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs

      • Bozhong Liu, Zheng Gong, Weidong Qiu, Dong Zheng
      Pages 247-256

Other Volumes

  1. Information Security Practice and Experience

About this book

This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.

Editors and Affiliations

  • Institute for Infocomm Research, Singapore, Singapore

    Feng Bao

  • Jinan University, Tianhe District, China

    Jian Weng

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access