Skip to main content
  • Conference proceedings
  • © 2012

Information Security Practice and Experience

8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings

  • Up-to-date results
  • Fast track conference proceedings
  • State-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7232)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ISPEC: International Conference on Information Security Practice and Experience

Conference proceedings info: ISPEC 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. Digital Signatures

    1. A Pre-computable Signature Scheme with Efficient Verification for RFID

      • Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan
      Pages 1-16
    2. Redactable Signatures for Independent Removal of Structure and Content

      • Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer
      Pages 17-33
  3. Public Key Cryptography

    1. Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring

      • Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu
      Pages 34-45
    2. Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack

      • Chong-zhi Gao, Dongqing Xie, Baodian Wei
      Pages 46-62
    3. Computational Soundness of Indistinguishability Properties without Computable Parsing

      • Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, Hideki Sakurada
      Pages 63-79
  4. Cryptanalysis I: Differential Attacks

    1. New Impossible Differential Attacks on Camellia

      • Dongxia Bai, Leibo Li
      Pages 80-96
    2. Impossible Differential Attacks on Reduced-Round LBlock

      • Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li
      Pages 97-108
    3. New Truncated Differential Cryptanalysis on 3D Block Cipher

      • Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
      Pages 109-125
  5. Applications I.i: Oblivious Transfer

    1. A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions

      • Preetha Mathew K., Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan
      Pages 144-157
  6. Applications I.ii: Internet Security (Works-in-Progress)

    1. Towards Fine-Grained Access Control on Browser Extensions

      • Lei Wang, Ji Xiang, Jiwu Jing, Lingchen Zhang
      Pages 158-169
    2. Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family

      • Yang-Wai Chow, Willy Susilo
      Pages 170-181
  7. Key Management

    1. High-Entropy Visual Identification for Touch Screen Devices

      • Nathaniel Wesley Filardo, Giuseppe Ateniese
      Pages 182-198
    2. A Framework for Security Analysis of Key Derivation Functions

      • Chuah Chai Wen, Edward Dawson, Juan Manuel González Nieto, Leonie Simpson
      Pages 199-216
  8. Applied Cryptography

    1. On the Equivalence of Two Definitions of Visual Cryptography Scheme

      • Teng Guo, Feng Liu, ChuanKun Wu
      Pages 217-227
    2. Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing

      • Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi
      Pages 228-244
    3. Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks

      • Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote
      Pages 245-258
  9. Applications II.i: PINs

    1. iPIN and mTAN for Secure eID Applications

      • Johannes Braun, Moritz Horsch, Alexander Wiesmaier
      Pages 259-276
  10. Applications II.ii: Fundamentals (Works-in-Progress)

Other Volumes

  1. Information Security Practice and Experience

About this book

This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012. The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential attacks, oblivious transfer, internet security, key management, applied cryptography, pins, fundamentals, fault attacks, and key recovery.

Editors and Affiliations

  • School of Computer Science, University of Birmingham, UK

    Mark D. Ryan

  • Toshiba Corporation, Saiwai-ku, Japan

    Ben Smyth

  • School of Computer Science & Software Engineering, University of Wollongong, Wollongong, Australia

    Guilin Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access