Skip to main content
  • Conference proceedings
  • © 2015

Information Security Practice and Experience

11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9065)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISPEC: International Conference on Information Security Practice and Experience

Conference proceedings info: ISPEC 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (39 papers)

  1. Front Matter

    Pages 1-14
  2. System Security

    1. Front Matter

      Pages 1-1
    2. Operating System Security Policy Hardening via Capability Dependency Graphs

      • Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng
      Pages 3-17
  3. Stream cipher I

    1. Front Matter

      Pages 33-33
    2. Differential Fault Analysis of Streebog

      • Riham AlTawy, Amr M. Youssef
      Pages 35-49
    3. Fault Attacks on Stream Cipher Scream

      • Shaoyu Du, Bin Zhang, Zhenqi Li, Dongdai Lin
      Pages 50-64
    4. New Related Key Attacks on the RAKAPOSHI Stream Cipher

      • Lin Ding, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, Wei Zhao
      Pages 65-75
  4. Analysis

    1. Front Matter

      Pages 77-77
    2. Cramer-Shoup Like Chosen Ciphertext Security from LPN

      • Xiaochao Sun, Bao Li, Xianhui Lu
      Pages 79-95
    3. Partial Prime Factor Exposure Attacks on RSA and Its Takagi’s Variant

      • Liqiang Peng, Lei Hu, Zhangjie Huang, Jun Xu
      Pages 96-108
    4. Analysis of Fractional ωmbNAF for Scalar Multiplication

      • Weixuan Li, Wei Yu, Kunpeng Wang
      Pages 109-120
    5. On the Effectiveness of Different Botnet Detection Approaches

      • Fariba Haddadi, Duc Le Cong, Laura Porter, A. Nur Zincir-Heywood
      Pages 121-135
  5. Key Exchange Protocol

    1. Front Matter

      Pages 137-137
    2. Strongly Secure Key Exchange Protocol with Minimal KEM

      • Baoping Tian, Fushan Wei, Chuangui Ma
      Pages 139-153
  6. Elliptic Curve Cryptography

    1. Front Matter

      Pages 169-169
    2. Models of Curves from GHS Attack in Odd Characteristic

      • Song Tian, Wei Yu, Bao Li, Kunpeng Wang
      Pages 171-180
    3. Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves

      • Song Tian, Wei Yu, Bao Li, Kunpeng Wang
      Pages 181-191
    4. Batch Blind Signatures on Elliptic Curves

      • Yang Sun, Qianhong Wu, Bo Qin, Yujue Wang, Jianwei Liu
      Pages 192-206

Other Volumes

  1. Information Security Practice and Experience

About this book

This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015.
The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.

Editors and Affiliations

  • University of Malaga, Malaga, Spain

    Javier Lopez

  • Institute for Infocomm Research, Singapore, Singapore

    Yongdong Wu

Bibliographic Information

  • Book Title: Information Security Practice and Experience

  • Book Subtitle: 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings

  • Editors: Javier Lopez, Yongdong Wu

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-17533-1

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2015

  • Softcover ISBN: 978-3-319-17532-4Published: 20 April 2015

  • eBook ISBN: 978-3-319-17533-1Published: 08 April 2015

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 576

  • Number of Illustrations: 76 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access