Information Security: 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings
Xuejia Lai, Jianying Zhou, Hui Li
Springer Science & Business Media, Oct 10, 2011 - Computers - 388 pages
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
adversary adversary’s aggregate signature algorithm analysis assumption authentication birthmark botnet byte-code challenger cipher ciphertext CL-AKE compute construction cryptographic database decryption denote detection differential privacy dynamic efficient encryption scheme EUROCRYPT execution Facebook Heidelberg hypervisor identity IEEE implementation input IP addresses kernel objects keystream LNCS multisignature near-duplicate Nilsimsa obfuscation oblivious obscure bots operations outputs packet parameters permutation phase pirate decoder plaintext private key probability probe problem proof proposed protocol public key query random oracle random oracle model RatBot replacement attacks RFID rootkits round S-Box SCF-PEKS secret key secret sharing Section server session signature scheme signer single sign-on SPIT spoofing IP Springer stream cipher system call Theorem third-party time-selective converter traitor tracing tuple undeniable signature user’s VANETs verifier VoIP Δ Δ Δ