Skip to main content
  • Conference proceedings
  • © 2010

Information Security, Practice and Experience

6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6047)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISPEC: International Conference on Information Security Practice and Experience

Conference proceedings info: ISPEC 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

  2. Cryptanalysis

    1. Integral Attacks on Reduced-Round ARIA Block Cipher

      • Yanjun Li, Wenling Wu, Lei Zhang
      Pages 19-29
    2. On the Security of NOEKEON against Side Channel Cube Attacks

      • Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry
      Pages 45-55
  3. Algorithms and Implementations (I)

    1. On Fast and Approximate Attack Tree Computations

      • Aivo Jürgenson, Jan Willemson
      Pages 56-66
    2. Width-3 Joint Sparse Form

      • Katsuyuki Okeya, Hidehiro Kato, Yasuyuki Nogami
      Pages 67-84
    3. Accelerating Inverse of GF(2n) with Precomputation

      • Xu Lei, Lin Dongdai
      Pages 85-95
  4. Network Security

    1. Host-Based Security Sensor Integrity in Multiprocessing Environments

      • Thomas Richard McEvoy, Stephen D. Wolthusen
      Pages 138-152
    2. Using Purpose Capturing Signatures to Defeat Computer Virus Mutating

      • Xiaoqi Jia, Xi Xiong, Jiwu Jing, Peng Liu
      Pages 153-171
    3. Rate-Based Watermark Traceback: A New Approach

      • Zongbin Liu, Jiwu Jing, Peng Liu
      Pages 172-186
    4. Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes

      • Farshid Farhat, Mohammad-Reza Pakravan, Mahmoud Salmasizadeh, Mohammad-Reza Aref
      Pages 187-200
  5. Access Control

    1. Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk

      • Zhuo Tang, Shaohua Zhang, Kenli Li, Benming Feng
      Pages 201-216
    2. A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS),

      • Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, Seungjoo Kim
      Pages 217-228
  6. Identity Management

    1. A Trustworthy ID Management Mechanism in Open Market

      • Inkyung Jeun, Dongho Won
      Pages 229-240
    2. BioID: Biometric-Based Identity Management

      • Byoung-Jin Han, Dong-Whi Shin, Hyoung-Jin Lim, In-Kyung Jeun, Hyun-Chul Jung
      Pages 241-250
  7. Trust Management

Other Volumes

  1. Information Security, Practice and Experience

Editors and Affiliations

  • Department of Information Security Engineering, Soonchunhyang University, Chungcheongnam-do, Korea

    Jin Kwak

  • School of Information Systems, Singapore Management University, Singapore

    Robert H. Deng

  • Internet and Security Policy Division, Korea Internet and Security Agency, Seoul, Korea

    Yoojae Won

  • School of Computer Science, University of Birmingham, Birmingham, UK

    Guilin Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access