Skip to main content
  • Conference proceedings
  • © 2012

Information Security

15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings

  • Fast track conference proceedings
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7483)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (24 papers)

  1. Front Matter

  2. Invited Paper

    1. Privacy-Preserving Speaker Authentication

      • Manas Pathak, Jose Portelo, Bhiksha Raj, Isabel Trancoso
      Pages 1-22
  3. Cryptography and Cryptanalysis

    1. Differential Attacks on Reduced RIPEMD-160

      • Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer
      Pages 23-38
    2. Revisiting Difficulty Notions for Client Puzzles and DoS Resilience

      • Bogdan Groza, Bogdan Warinschi
      Pages 39-54
  4. Mobility

    1. Strong Authentication with Mobile Phone

      • Sanna Suoranta, André Andrade, Tuomas Aura
      Pages 70-85
    2. Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?

      • Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot
      Pages 86-103
  5. Cards and Sensors

    1. Domain-Specific Pseudonymous Signatures for the German Identity Card

      • Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
      Pages 104-119
    2. 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks

      • Samiran Bag, Aritra Dhar, Pinaki Sarkar
      Pages 136-150
  6. Software Security

    1. Learning Fine-Grained Structured Input for Memory Corruption Detection

      • Lei Zhao, Debin Gao, Lina Wang
      Pages 151-167
    2. Dynamic Anomaly Detection for More Trustworthy Outsourced Computation

      • Sami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden, Mira Mezini, Stefan Katzenbeisser
      Pages 168-187
    3. An Empirical Study of Dangerous Behaviors in Firefox Extensions

      • Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang et al.
      Pages 188-203
  7. Processing Encrypted Data

    1. Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems

      • Michael Clear, Karl Reid, Desmond Ennis, Arthur Hughes, Hitesh Tewari
      Pages 204-223
    2. Selective Document Retrieval from Encrypted Database

      • Christoph Bösch, Qiang Tang, Pieter Hartel, Willem Jonker
      Pages 224-241
    3. Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited

      • Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser
      Pages 242-257
  8. Authentication and Identification

    1. Secure Hierarchical Identity-Based Identification without Random Oracles

      • Atsushi Fujioka, Taiichi Saito, Keita Xagawa
      Pages 258-273
  9. New Directions in Access Control

    1. Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems

      • Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang
      Pages 290-305
    2. A Quantitative Approach for Inexact Enforcement of Security Policies

      • Peter Drábik, Fabio Martinelli, Charles Morisset
      Pages 306-321

Other Volumes

  1. Information Security

About this book

This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012.
The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.

Editors and Affiliations

  • Institute of Security in Distributed Applications, University of Technology, Hamburg, Germany

    Dieter Gollmann

  • Department of Computer Science, University of Erlangen-Nürnberg, Erlangen, Germany

    Felix C. Freiling

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access