Information Security

8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings

  • Jianying Zhou
  • Javier Lopez
  • Robert H. Deng
  • Feng Bao
Conference proceedings ISC 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3650)

Table of contents

  1. Front Matter
  2. Network Security I

    1. Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis
      Pages 1-15
    2. Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
      Pages 16-28
  3. Trust & Privacy

    1. Deholo Nali, Carlisle Adams, Ali Miri
      Pages 29-43
    2. Elisavet Konstantinou, Vasiliki Liagkou, Paul Spirakis, Yannis C. Stamatiou, Moti Yung
      Pages 44-58
    3. Yanjiang Yang, Beng Chin Ooi
      Pages 59-73
  4. Key Management & Protocols

    1. Ratna Dutta, Rana Barua
      Pages 74-88
    2. Hyung Mok Lee, Kyung Ju Ha, Kyo Min Ku
      Pages 104-117
    3. Dennis Hofheinz, Dominique Unruh
      Pages 118-133
  5. Public Key Encryption & Signature

    1. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
      Pages 134-148
    2. Victor K. Wei
      Pages 149-163
    3. Jean Monnerat, Serge Vaudenay
      Pages 164-178
  6. Network Security II

    1. Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis
      Pages 179-193
    2. Souhwan Jung, Jaeduck Choi, Younghan Kim, Sungi Kim
      Pages 194-202
  7. Signcryption

    1. Alexander W. Dent
      Pages 203-217
    2. Guomin Yang, Duncan S. Wong, Xiaotie Deng
      Pages 218-232
    3. Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu
      Pages 233-243
  8. Crypto Algorithm & Analysis

    1. Peng Wang, Dengguo Feng, Wenling Wu
      Pages 274-287
    2. Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim
      Pages 288-299
  9. Cryptography

  10. Applications

    1. Yvo Desmedt, Kaoru Kurosawa
      Pages 329-343
    2. Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
      Pages 359-373
  11. Software Security

    1. Gary S. -W. Yeo, Raphael C. -W. Phan
      Pages 402-416
    2. Hongxia Jin, Ginger Myles, Jeffery Lotspiech
      Pages 417-430
  12. Authorization & Access Control

    1. Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar
      Pages 431-445
    2. Nan Zhang, Mark Ryan, Dimitar P. Guelev
      Pages 446-460
    3. Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu
      Pages 461-473
  13. Student Papers

    1. Daoxi Xiu, Zhaoyu Liu
      Pages 482-489
    2. Marek Klonowski, Mirosław Kutyłowski, Anna Lauks, Filip Zagórski
      Pages 490-497
    3. German Florez-Larrahondo, Susan M. Bridges, Rayford Vaughn
      Pages 506-514
  14. Back Matter

About these proceedings


This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought together individuals from academia and - dustry involvedin manyresearchdisciplines of information security to foster the exchange of ideas. During recent years this conference has tried to place special emphasis on the practical aspects of information security, and since it passed from being an international workshop to being an international conference in 2001, it has become one of the most relevant forums at which researchers meet and discuss emerging security challenges and solutions. Advised by the ISC Steering Committee, and in order to provide students with more opportunities for publication, ISC 2005 accepted extra student papers - sides the regular papers. The initiative was very well accepted by the young sector of the scienti?c community, and we hope that the success of this idea will remainfornextISCevents. AnotherimportantfactorforthesuccessofISC2005 was that selected papers in the proceedings will be invited for submission to a special issue of the InternationalJournalof InformationSecurity. The result was an incredible response to the call for papers; we received 271 submissions, the highest since ISC events started. It goes without saying that the paper selection process was more competitive and di?cult than ever before — only 33 regular papers were accepted, plus 5 student papers for a special student session.


Algorithms Public Key algorithm cryptography data security information network security privacy security trust

Editors and affiliations

  • Jianying Zhou
    • 1
  • Javier Lopez
    • 2
  • Robert H. Deng
    • 3
  • Feng Bao
    • 4
  1. 1.Cryptography and Security Department Institute for Infocomm ResearchSingapore
  2. 2.Department of Information and Communication TechnologiesUniversity of A CoruñaSpain
  3. 3.School of Information SystemsSingapore Management UniversitySingapore
  4. 4.Institute for Infocomm ResearchSingapore

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-29001-8
  • Online ISBN 978-3-540-31930-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site