Skip to main content
  • Conference proceedings
  • © 2013

Information Security Practice and Experience

9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings

  • Fast track conference proceedings
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7863)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISPEC: International Conference on Information Security Practice and Experience

Conference proceedings info: ISPEC 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. Network Security

    1. Trusted Identity Management for Overlay Networks

      • Stefan Kraxberger, Ronald Toegl, Martin Pirker, Elisa Pintado Guijarro, Guillermo Garcia Millan
      Pages 16-30
    2. Situational Awareness for Improving Network Resilience Management

      • Mixia Liu, Tao Feng, Paul Smith, David Hutchison
      Pages 31-43
    3. Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model

      • Yuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen, Yingjun Zhang
      Pages 44-59
  3. Identity-Based Cryptography

    1. Attribute Specified Identity-Based Encryption

      • Hao Xiong, Tsz Hon Yuen, Cong Zhang, Yi-Jun He, Siu Ming Yiu
      Pages 60-74
    2. Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions

      • Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu
      Pages 75-90
    3. Identity-Based Multisignature with Message Recovery

      • Kefeng Wang, Yi Mu, Willy Susilo
      Pages 91-104
    4. Improving the Message-Ciphertext Rate of Lewko’s Fully Secure IBE Scheme

      • Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei
      Pages 105-116
  4. Cryptographic Primitives

    1. Accountable Trapdoor Sanitizable Signatures

      • Junzuo Lai, Xuhua Ding, Yongdong Wu
      Pages 117-131
    2. A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release

      • Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang
      Pages 132-146
    3. About Hash into Montgomery Form Elliptic Curves

      • Wei Yu, Kunpeng Wang, Bao Li, Song Tian
      Pages 147-159
    4. Joint Triple-Base Number System for Multi-Scalar Multiplication

      • Wei Yu, Kunpeng Wang, Bao Li, Song Tian
      Pages 160-173
  5. Security Protocols

    1. Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks

      • Divyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg
      Pages 174-188
    2. Secure RFID Ownership Transfer Protocols

      • Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan
      Pages 189-203
    3. Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model

      • Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong
      Pages 204-217
    4. Simplified PACE|AA Protocol

      • Lucjan Hanzlik, Łukasz Krzywiecki, Mirosław Kutyłowski
      Pages 218-232
  6. System Security

    1. Efficient Attack Detection Based on a Compressed Model

      • Shichao Jin, Okhee Kim, Tieming Chen
      Pages 248-262
    2. A Digital Forensic Framework for Automated User Activity Reconstruction

      • Jungin Kang, Sangwook Lee, Heejo Lee
      Pages 263-277

Other Volumes

  1. Information Security Practice and Experience

About this book

This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks.

Editors and Affiliations

  • School of Information Systems, Singapore Management University, Singapore, Singapore

    Robert H. Deng

  • School of Computer and Communication, University of technology, Lanzhou, China

    Tao Feng

Bibliographic Information

  • Book Title: Information Security Practice and Experience

  • Book Subtitle: 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings

  • Editors: Robert H. Deng, Tao Feng

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-38033-4

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2013

  • Softcover ISBN: 978-3-642-38032-7Published: 19 April 2013

  • eBook ISBN: 978-3-642-38033-4Published: 18 November 2013

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 388

  • Number of Illustrations: 72 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access