3 July 2010

Special issue: Information security practice and experience

International Journal of Applied Cryptography 2(1) 2010

Papers from the 5th Information Security Practice and Experience Conference (ISPEC’09), held in Xi’an, China, 13–15 April 2009
  • Achieving high security and efficiency in RFID-tagged supply chains
  • Designing attacks on SIP call set-up
  • Defending against the pirate evolution attack
  • Strongly unforgeable ID-based signatures without random oracles
  • A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
  • Some results on cryptanalysis of SMS4 block cipher
  • TWISTERπ – a framework for secure and fast hash functions

No comments: