Skip to main content
  • Conference proceedings
  • © 2011

Information Security

14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings

  • Up-to-date results
  • Fast track conference proceedings
  • State-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7001)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Attacks

    1. Replacement Attacks on Behavior Based Software Birthmark

      • Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao et al.
      Pages 1-16
    2. How to Find Short RC4 Colliding Key Pairs

      • Jiageng Chen, Atsuko Miyaji
      Pages 32-46
  3. Protocols

    1. A Formal Approach to Distance-Bounding RFID Protocols

      • Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete
      Pages 47-62
    2. MASHA – Low Cost Authentication with a New Stream Cipher

      • Shinsaku Kiyomoto, Matt Henricksen, Wun-She Yap, Yuto Nakano, Kazuhide Fukushima
      Pages 63-78
    3. Toward Pairing-Free Certificateless Authenticated Key Exchanges

      • Hu Xiong, Qianhong Wu, Zhong Chen
      Pages 79-94
  4. Public-Key Cryptosystems

    1. The n-Diffie-Hellman Problem and Its Applications

      • Liqun Chen, Yu Chen
      Pages 119-134
  5. Network Security

    1. RatBot: Anti-enumeration Peer-to-Peer Botnets

      • Guanhua Yan, Songqing Chen, Stephan Eidenbenz
      Pages 135-151
    2. Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes

      • Ge Zhang, Simone Fischer-Hübner
      Pages 152-167
  6. Software Security

    1. Multi-stage Binary Code Obfuscation Using Improved Virtual Machine

      • Hui Fang, Yongdong Wu, Shuhong Wang, Yin Huang
      Pages 168-181
    2. Detection and Analysis of Cryptographic Data Inside Software

      • Ruoxu Zhao, Dawu Gu, Juanru Li, Ran Yu
      Pages 182-196
  7. System Security

    1. SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms

      • Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos
      Pages 197-212
    2. Hello rootKitty: A Lightweight Invariance-Enforcing Framework

      • Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen
      Pages 213-228
    3. Opacity Analysis in Trust Management Systems

      • Moritz Y. Becker, Masoud Koleini
      Pages 229-245
  8. Database Security

    1. Round-Efficient Oblivious Database Manipulation

      • Sven Laur, Jan Willemson, Bingsheng Zhang
      Pages 262-277
    2. A Privacy-Preserving Join on Outsourced Database

      • Sha Ma, Bo Yang, Kangshun Li, Feng Xia
      Pages 278-292

Other Volumes

  1. Information Security

About this book

This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.

Editors and Affiliations

  • Department of Computer Science and Engineering, Shanghai Jiao Tong University, Min Hang Shanghai, China

    Xuejia Lai

  • Cryptography and Security Department, Institute for Infocomm Research, Singapore

    Jianying Zhou

  • Key Laboratory of Computer Networks and Information, Security Xidian University, Shaanxi, China

    Hui Li

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access