Skip to main content
  • Conference proceedings
  • © 2018

Information Security

21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11060)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2018.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

    Pages I-XI
  2. Invited Paper

    1. Front Matter

      Pages 1-1
    2. Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs

      • Cecilia Boschini, Jan Camenisch, Gregory Neven
      Pages 3-22
  3. Software Security

    1. Front Matter

      Pages 23-23
    2. Secure Code Execution: A Generic PUF-Driven System Architecture

      • Stephan Kleber, Florian Unterstein, Matthias Hiller, Frank Slomka, Matthias Matousek, Frank Kargl et al.
      Pages 25-46
    3. Lumus: Dynamically Uncovering Evasive Android Applications

      • Vitor Afonso, Anatoli Kalysch, Tilo Müller, Daniela Oliveira, André Grégio, Paulo Lício de Geus
      Pages 47-66
    4. ICUFuzzer: Fuzzing ICU Library for Exploitable Bugs in Multiple Software

      • Kun Yang, Yuan Deng, Chao Zhang, Jianwei Zhuge, Haixin Duan
      Pages 67-84
    5. How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification

      • Kemal Bicakci, Enes Altuncu, Muhammet Sakir Sahkulubey, Hakan Ezgi Kiziloz, Yusuf Uzunay
      Pages 85-98
  4. Symmetric Ciphers and Cryptanalysis

    1. Front Matter

      Pages 99-99
    2. Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy

      • Yingjie Zhang, Siwei Sun, Jiahao Cai, Lei Hu
      Pages 101-115
    3. Conditional Cube Searching and Applications on Trivium-Variant Ciphers

      • Xiaojuan Zhang, Meicheng Liu, Dongdai Lin
      Pages 151-168
  5. Data Privacy and Anonymization

    1. Front Matter

      Pages 169-169
    2. Practical Attacks on Relational Databases Protected via Searchable Encryption

      • Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann, Cornelius Glackin
      Pages 171-191
  6. Outsourcing and Assisted Computing

    1. Front Matter

      Pages 211-211
    2. Multi-authority Fast Data Cloud-Outsourcing for Mobile Devices

      • Yanting Zhang, Jianwei Liu, Zongyang Zhang, Yang Hu
      Pages 231-249

Other Volumes

  1. Information Security

About this book

This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018.

The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security. 

Editors and Affiliations

  • University of Surrey, Guildford, United Kingdom

    Liqun Chen, Mark Manulis, Steve Schneider

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access