This book constitutes the refereed proceedings of the 8th International Information Security Conference, ISC 2005, held in Singapore in September 2005.
The 33 revised full papers presented together with 5 student papers were carefully reviewed and selected from 271 submissions. The papers are organized in topical sections on network security, trust and privacy, key management and protocols, public key encryption and signature, signcryption, crypto algorithm and analysis, cryptography, applications, software security, authorization, and access control.