Skip to main content
  • Conference proceedings
  • © 2006

Information Security Practice and Experience

Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3903)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISPEC: International Conference on Information Security Practice and Experience

Conference proceedings info: ISPEC 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (35 papers)

  1. Front Matter

  2. Cryptoanalysis

    1. Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication

      • Min Feng, Bin B. Zhu, Cunlai Zhao, Shipeng Li
      Pages 13-24
    2. Further Security Analysis of XTR

      • Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim
      Pages 33-44
  3. Network Security I

    1. A Counting-Based Method for Massive Spam Mail Classification

      • Hao Luo, Binxing Fang, Xiaochun Yun
      Pages 45-56
    2. Model and Estimation of Worm Propagation Under Network Partition

      • Ping Wang, Binxing Fang, Xiaochun Yun
      Pages 57-66
    3. Tackling Worm Detection Speed and False Alarm in Virus Throttling

      • Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi
      Pages 67-77
  4. Network Security II

    1. Using Data Field to Analyze Network Intrusions

      • Feng Xie, Shuo Bai
      Pages 78-89
    2. Adversarial Organization Modeling for Network Attack/Defense

      • Ji Wu, Chaoqun Ye, Shiyao Jin
      Pages 90-99
    3. A Novel Dynamic Immunization Strategy for Computer Network Epidemics

      • Zhifei Tao, Hai Jin, Zongfen Han, En Cheng
      Pages 100-111
    4. Preventing Web-Spoofing with Automatic Detecting Security Indicator

      • Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu
      Pages 112-122
  5. Security Protocol

    1. Security Protocol Analysis with Improved Authentication Tests

      • Xiehua Li, Shutang Yang, Jianhua Li, Hongwen Zhu
      Pages 123-133
    2. A Protocol of Member-Join in a Secret Sharing Scheme

      • Xiao Li, Mingxing He
      Pages 134-141
    3. More on Shared-Scalar-Product Protocols

      • Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu
      Pages 142-152
  6. Communication Security

    1. Efficient Public Key Broadcast Encryption Using Identifier of Receivers

      • Jung Wook Lee, Yong Ho Hwang, Pil Joong Lee
      Pages 153-164
    2. A Practical Clumped-Tree Multicast Encryption Scheme

      • Ling Dong, Kefei Chen
      Pages 165-176
    3. Trojan Horse Attack Strategy on Quantum Private Communication

      • Jinye Peng, Guangqiang He, Jin Xiong, Guihua Zeng
      Pages 177-186
  7. Signature and Key Agreement

    1. Linkable Democratic Group Signatures

      • Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
      Pages 187-201
    2. Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings

      • Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
      Pages 202-213

Other Volumes

  1. Information Security Practice and Experience

About this book

This volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference 2006 (ISPEC 2006), which took place in Hangzhou, China, April 11–14, 2006. The inaugural ISPEC 2005 was held exactly one year earlier in Singapore. As applications of information security technologies become pervasive, issues pertaining to their deployment and operations are becoming increasingly imp- tant. ISPEC is an annual conference that brings together researchers and pr- titioners to provide a con?uence of new information security technologies, their applications and their integration with IT systems in various vertical sectors. ISPEC 2006 received 307 submissions. This is probably the highest number of paper submissions in any information security-related technical conferences. Due to this exceptionally large number of submissions and the high quality of the submitted papers, not all the papers that contained innovative ideas could be accepted. Each paper was sent to at least three Program Committee m- bers for comments. Based on the reviewers’ comments and discussion by the Program Committee, of the 307 submissions, 35 were selected for inclusion in these proceedings as research track papers and another 21 papers were selected as industrial track papers and are published in the Journal of Shanghai Jiaotong University (Science).

Editors and Affiliations

  • Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China

    Kefei Chen, Xuejia Lai

  • Singapore Management University (SMU), Singapore

    Robert Deng

  • Cryptography and Security Department Institute for Infocomm Research, Singapore

    Jianying Zhou

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access