Information and Communications Security

11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings

  • Sihan Qing
  • Chris J. Mitchell
  • Guilin Wang
Conference proceedings ICICS 2009

DOI: 10.1007/978-3-642-11145-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5927)

Table of contents (39 papers)

  1. Front Matter
  2. Invited Talks

  3. Cryptanalysis

    1. Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform
      Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, Kazuo Ohta
      Pages 3-16
    2. Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
      Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
      Pages 17-31
  4. Algorithms and Implementations

    1. The rakaposhi Stream Cipher
      Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara
      Pages 32-46
    2. Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes
      Zhen Wang, Mark Karpovsky, Berk Sunar, Ajay Joshi
      Pages 47-62
    3. Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems
      Manuel Koschuch, Johann Großschädl, Dan Page, Philipp Grabher, Matthias Hudler, Michael Krüger
      Pages 63-79
  5. Public Key Cryptography

    1. Online/Offline Ring Signature Scheme
      Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou
      Pages 80-90
    2. Policy-Controlled Signatures
      Pairat Thorncharoensri, Willy Susilo, Yi Mu
      Pages 91-106
    3. Public Key Encryption without Random Oracle Made Truly Practical
      Puwen Wei, Xiaoyun Wang, Yuliang Zheng
      Pages 107-120
  6. Security Applications

    1. Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains
      Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng
      Pages 150-164
    2. Biometric-Based Non-transferable Anonymous Credentials
      Marina Blanton, William M. P. Hudelson
      Pages 165-180
  7. Software Security

    1. Secure Remote Execution of Sequential Computations
      Ghassan O. Karame, Mario Strasser, Srdjan Čapkun
      Pages 181-197
    2. Architecture- and OS-Independent Binary-Level Dynamic Test Generation
      Gen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang
      Pages 198-210
  8. System Security

    1. Trusted Isolation Environment: An Attestation Architecture with Usage Control Model
      Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei Shi, Yahui Yang et al.
      Pages 226-240
    2. Denial-of-Service Attacks on Host-Based Generic Unpackers
      Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia
      Pages 241-253

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Conference on Information and Communications Security, ICICS 2009, held in Beijing, China, in December 2009.

The 37 revised full papers presented together with one invited paper were carefully reviewed and selected from 162 submissions. The papers are organized in topical sections on cryptanalysis, algorithms and implemantations, public key cryptography, security applications, software security, system security, network security, database security, trust management, and applied cryptography.

Keywords

Camellia access control algorithms anomaly detection anonymity system association rules mining authentication biometric data block cipher collaborative filtering communication cryptanalysis cryptographic protocols cryptography information

Editors and affiliations

  • Sihan Qing
    • 1
  • Chris J. Mitchell
    • 2
  • Guilin Wang
    • 3
  1. 1.Institute of SoftwareChinese Academy of SciencesBeijingChina
  2. 2.Royal HollowayUniversity of London, Information Security GroupEghamUnited Kingdom
  3. 3.School of Computer ScienceUniversity of BirminghamBirminghamUnited Kingdom

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-11144-0
  • Online ISBN 978-3-642-11145-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349