Skip to main content
  • Conference proceedings
  • © 2015

Information Security

18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9290)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

    Pages I-XIII
  2. Cryptography I: Signatures

    1. Front Matter

      Pages 1-1
    2. Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures

      • Fuqun Wang, Kunpeng Wang, Bao Li, Yuanyuan Gao
      Pages 42-60
    3. Graded Signatures

      • Aggelos Kiayias, Murat Osmanoglu, Qiang Tang
      Pages 61-80
  3. System and Software Security

    1. Front Matter

      Pages 81-81
    2. Factors Impacting the Effort Required to Fix Security Vulnerabilities

      • Lotfi ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim D. Brucker, Philip Miseldine
      Pages 102-119
    3. Software Security Maturity in Public Organisations

      • Martin Gilje Jaatun, Daniela S. Cruzes, Karin Bernsmed, Inger Anne Tøndel, Lillian Røstad
      Pages 120-138
  4. Cryptanalysis I: Block Ciphers

    1. Front Matter

      Pages 139-139
    2. Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis

      • Siwei Sun, Lei Hu, Meiqin Wang, Qianqian Yang, Kexin Qiao, Xiaoshuang Ma et al.
      Pages 141-157
    3. Automatic Search for Linear Trails of the SPECK Family

      • Yuan Yao, Bin Zhang, Wenling Wu
      Pages 158-176
  5. Cryptography II: Protocols

    1. Front Matter

      Pages 189-189
    2. Oblivious PAKE: Efficient Handling of Password Trials

      • Franziskus Kiefer, Mark Manulis
      Pages 191-208
    3. On the Efficiency of Multi-party Contract Signing Protocols

      • Gerard Draper-Gil, Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos, Jianying Zhou
      Pages 227-243
    4. On the Provable Security of the Dragonfly Protocol

      • Jean Lancrenon, Marjan Å krobot
      Pages 244-261
  6. Network and Cloud Security

    1. Front Matter

      Pages 263-263

Other Volumes

  1. Information Security

About this book

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.    

Reviews

       

Editors and Affiliations

  • University of Malaga, Malaga, Spain

    Javier Lopez

  • Royal Holloway University of London, Egham, United Kingdom

    Chris J. Mitchell

About the editors

   

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access