Skip to main content
  • Conference proceedings
  • © 2016

Information Security Practice and Experience

12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10060)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISPEC: International Conference on Information Security Practice and Experience

Conference proceedings info: ISPEC 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

    Pages I-XII
  2. Cryptanalysis of Midori128 Using Impossible Differential Techniques

    • Zhan Chen, Huaifeng Chen, Xiaoyun Wang
    Pages 1-12
  3. The Distribution of \(2^n\)-Periodic Binary Sequences with Fixed k-Error Linear Complexity

    • Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu
    Pages 13-36
  4. A Spark-Based DDoS Attack Detection Model in Cloud Services

    • Jian Zhang, Yawei Zhang, Pin Liu, Jianbiao He
    Pages 48-64
  5. Security of SM4 Against (Related-Key) Differential Cryptanalysis

    • Jian Zhang, Wenling Wu, Yafei Zheng
    Pages 65-78
  6. KopperCoin – A Distributed File Storage with Financial Incentives

    • Henning Kopp, Christoph Bösch, Frank Kargl
    Pages 79-93
  7. Practical Signature Scheme from \(\varGamma \)-Protocol

    • Zhoujun Ma, Li Yang, Yunlei Zhao
    Pages 94-109
  8. Collision Attacks on CAESAR Second-Round Candidate: ELmD

    • Jian Zhang, Wenling Wu, Yafei Zheng
    Pages 122-136
  9. Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU

    • Zhiniang Peng, Shaohua Tang, Ju Chen, Chen Wu, Xinglin Zhang
    Pages 151-166
  10. Homomorphically Encrypted Arithmetic Operations Over the Integer Ring

    • Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng
    Pages 167-181
  11. A Privacy Preserving Source Verifiable Encryption Scheme

    • Zhongyuan Yao, Yi Mu, Guomin Yang
    Pages 182-193
  12. RFID Tags Batch Authentication Revisited – Communication Overhead and Server Computational Complexity Limits

    • Przemysław Błaśkiewicz, Łukasz Krzywiecki, Piotr Syga
    Pages 209-223
  13. Privacy-Preserving Cloud Auditing with Multiple Uploaders

    • Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo
    Pages 224-237
  14. A Formal Concept of Domain Pseudonymous Signatures

    • Kamil Kluczniak, Lucjan Hanzlik, Mirosław Kutyłowski
    Pages 238-254
  15. Efficient Tag Path Authentication Protocol with Less Tag Memory

    • Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao
    Pages 255-270
  16. Anonymizing Bitcoin Transaction

    • Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shi-Feng Sun, Xinyi Huang
    Pages 271-283

Other Volumes

  1. Information Security Practice and Experience

About this book

This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.

Editors and Affiliations

  • Huawei International, Singapore, Singapore

    Feng Bao

  • University of Surrey, Guilford, United Kingdom

    Liqun Chen

  • Singapore Management University, Singapore, Singapore

    Robert H. Deng

  • Guangzhou University, Guangzhou, China

    Guojun Wang

Bibliographic Information

  • Book Title: Information Security Practice and Experience

  • Book Subtitle: 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings

  • Editors: Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-49151-6

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing AG 2016

  • Softcover ISBN: 978-3-319-49150-9Published: 05 November 2016

  • eBook ISBN: 978-3-319-49151-6Published: 02 November 2016

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XII, 380

  • Number of Illustrations: 82 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access