Skip to main content
  • Conference proceedings
  • © 2014

Information Security Practice and Experience

10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8434)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISPEC: International Conference on Information Security Practice and Experience

Conference proceedings info: ISPEC 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (41 papers)

  1. Front Matter

  2. Invited Papers from Keynote Speakers

    1. Access Control in and Around the Browser

      • Dieter Gollmann
      Pages 1-7
    2. Improving Thomlinson-Walker’s Software Patching Scheme Using Standard Cryptographic and Statistical Tools

      • Michel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache
      Pages 8-14
    3. Preserving Receiver-Location Privacy in Wireless Sensor Networks

      • Javier Lopez, Ruben Rios, Jorge Cuellar
      Pages 15-27
    4. Data Security and Privacy in the Cloud

      • Pierangela Samarati
      Pages 28-41
    5. Forbidden City Model – Towards a Practice Relevant Framework for Designing Cryptographic Protocols

      • Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak, Przemysław Kubiak, Łukasz Krzywiecki
      Pages 42-59
  3. Network Security

    1. A CAPTCHA Scheme Based on the Identification of Character Locations

      • Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
      Pages 60-74
    2. A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches

      • Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo
      Pages 75-89
    3. Obfuscating Encrypted Web Traffic with Combined Objects

      • Yi Tang, Piaoping Lin, Zhaokai Luo
      Pages 90-104
    4. A Website Credibility Assessment Scheme Based on Page Association

      • Pei Li, Jian Mao, Ruilong Wang, Lihua Zhang, Tao Wei
      Pages 105-118
  4. System Security

    1. A Methodology for Hook-Based Kernel Level Rootkits

      • Chien-Ming Chen, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun
      Pages 119-128
    2. Precise Instruction-Level Side Channel Profiling of Embedded Processors

      • Mehari Msgna, Konstantinos Markantonakis, Keith Mayes
      Pages 129-143
    3. SBE − A Precise Shellcode Detection Engine Based on Emulation and Support Vector Machine

      • Yonggan Hou, J. W. Zhuge, Dan Xin, Wenya Feng
      Pages 159-171
    4. HDROP: Detecting ROP Attacks Using Performance Monitoring Counters

      • HongWei Zhou, Xin Wu, WenChang Shi, JinHui Yuan, Bin Liang
      Pages 172-186
  5. Security Practice

    1. Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs

      • Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng
      Pages 187-201
    2. High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit

      • Shujie Cui, Johann Großschädl, Zhe Liu, Qiuliang Xu
      Pages 202-216
    3. A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm

      • Chenyang Tu, Wei He, Neng Gao, Eduardo de la Torre, Zeyi Liu, Limin Liu
      Pages 217-231
    4. Implementing a Covert Timing Channel Based on Mimic Function

      • Jing Wang, Le Guan, Limin Liu, Daren Zha
      Pages 247-261

Other Volumes

  1. Information Security Practice and Experience

About this book

This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.

Editors and Affiliations

  • School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China

    Xinyi Huang

  • Infocom Security Department, Institute for Infocomm Research, Singapore, Singapore

    Jianying Zhou

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access