Skip to main content
  • Conference proceedings
  • © 2009

Information Security

12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5735)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISC: International Conference on Information Security

Conference proceedings info: ISC 2009.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (38 papers)

  1. Front Matter

  2. Analysis Techniques

    1. A New Approach to χ 2 Cryptanalysis of Block Ciphers

      • Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel
      Pages 1-16
    2. Analysis and Optimization of Cryptographically Generated Addresses

      • Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux
      Pages 17-32
    3. Security Analysis of the PACE Key-Agreement Protocol

      • Jens Bender, Marc Fischlin, Dennis Kügler
      Pages 33-48
    4. Towards Security Notions for White-Box Cryptography

      • Amitabh Saxena, Brecht Wyseur, Bart Preneel
      Pages 49-58
    5. A Calculus to Detect Guessing Attacks

      • Bogdan Groza, Marius Minea
      Pages 59-67
  3. Hash Functions

    1. Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n

      • Mario Lamberger, Florian Mendel
      Pages 68-78
    2. On Free-Start Collisions and Collisions for TIB3

      • Florian Mendel, Martin Schläffer
      Pages 95-106
  4. Database Security and Biometrics

    1. Detection of Database Intrusion Using a Two-Stage Fuzzy System

      • Suvasini Panigrahi, Shamik Sural
      Pages 107-120
    2. Cancelable Iris Biometrics Using Block Re-mapping and Image Warping

      • Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl
      Pages 135-142
    3. Iris Recognition in Nonideal Situations

      • Kaushik Roy, Prabir Bhattacharya
      Pages 143-150
  5. Algebraic Attacks and Proxy Re-Encryption

    1. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security

      • Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao
      Pages 151-166
    2. Practical Algebraic Attacks on the Hitag2 Stream Cipher

      • Nicolas T. Courtois, Sean O’Neil, Jean-Jacques Quisquater
      Pages 167-176
    3. A New Construction of Boolean Functions with Maximum Algebraic Immunity

      • Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li
      Pages 177-185
  6. Distributed System Security

    1. A2M: Access-Assured Mobile Desktop Computing

      • Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh
      Pages 186-201
    2. Automated Spyware Collection and Analysis

      • Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda
      Pages 202-217
    3. Towards Unifying Vulnerability Information for Attack Graph Construction

      • Sebastian Roschke, Feng Cheng, Robert Schuppenies, Christoph Meinel
      Pages 218-233
    4. Traitor Tracing without A Priori Bound on the Coalition Size

      • Hongxia Jin, Serdar Pehlivanoglu
      Pages 234-241

Other Volumes

  1. Information Security

About this book

This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009.

The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services.

Editors and Affiliations

  • Dipartimento di Tecnologie dell’ Informazione, Università degli Studi di Milano, Crema, Italy

    Pierangela Samarati

  • Computer Science Department, Google Inc. and Columbia University, New York, USA

    Moti Yung

  • Information Security Group, Pisa Research Area, Istituto di Informatica e Telematica - IIT Consiglio Nazionale delle Ricerche - C.N.R., Pisa, Italy

    Fabio Martinelli

  • Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, Crema, Italy

    Claudio A. Ardagna

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access