Information and Communications Security

5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003. Proceedings

  • Sihan Qing
  • Dieter Gollmann
  • Jianying Zhou
Conference proceedings ICICS 2003

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2836)

Table of contents

  1. Front Matter
  2. Wang Feng, Yasuyuki Nogami, Yoshitaka Morikawa
    Pages 1-10
  3. Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim
    Pages 11-21
  4. Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei
    Pages 34-46
  5. Ricardo Nabhen, Edgard Jamhour, Carlos Maziero
    Pages 47-59
  6. Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine
    Pages 60-71
  7. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
    Pages 72-83
  8. Hongjun Wu, Feng Bao, Robert H. Deng
    Pages 84-87
  9. Jianying Zhou, Feng Bao, Robert Deng
    Pages 88-99
  10. Jong-Phil Yang, Chul Sur, Kyung Hyune Rhee
    Pages 100-111
  11. Jose Antonio Onieva, Jianying Zhou, Javier Lopez
    Pages 112-123
  12. Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma
    Pages 124-135
  13. Yongliang Liu, Wen Gao, Zhao Wang, Shaohui Liu
    Pages 136-144
  14. Gregory Saunders, Michael Hitchens, Vijay Varadharajan
    Pages 145-157
  15. Gang Li, Jie Yang
    Pages 170-178
  16. Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Pages 191-201
  17. Tie-Yan Li, HuaFei Zhu, Kwok-Yan Lam
    Pages 214-225
  18. Qian-Hong Wu, Jian-Hong Zhang, Yu-Min Wang
    Pages 226-237
  19. Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
    Pages 249-259
  20. Yan Wang, Shuwang Lü, Zhenhua Liu
    Pages 260-268
  21. Yang Cui, Kazukuni Kobara, Hideki Imai
    Pages 269-279
  22. Jianhong Zhang, Qianhong Wu, Yumin Wang
    Pages 292-300
  23. Feng Bao, Robert H. Deng, HuaFei Zhu
    Pages 301-312
  24. Taeshik Sohn, JungTaek Seo, Jongsub Moon
    Pages 313-324
  25. Zhen Xu, Dengguo Feng, Lan Li, Hua Chen
    Pages 337-347
  26. Xiaoqiang Li, Xiangyang Xue, Wei Li
    Pages 360-369
  27. Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfen Han
    Pages 370-381
  28. Hui-Feng Huang, Chin-Chen Chang
    Pages 382-392
  29. Meng Zhang, Jiu-bin Ju
    Pages 393-404
  30. Back Matter

About these proceedings


ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 10–13 October 2003. Among the preceding conferences, ICICS’97 was held in B- jing, China, ICICS’99 in Sydney, Australia, ICICS 2001 in Xi’an, China, and ICICS 2002,in Singapore.TheproceedingswerereleasedasVolumes1334,1726, 2229, and 2513 of the LNCS series of Springer-Verlag, respectively. ICICS 2003 was sponsored by the Chinese Academy of Sciences (CAS), the National Natural Science Foundation of China, and the China Computer F- eration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conferences has been to o?er the attendees the - portunity to discuss the state-of-the-art technology in theoretical and practical aspects of information and communications security. The response to the Call forPaperswassurprising.WhenwewerepreparingtheconferencebetweenApril and May, China, including the conference venue, Huhehaote City, was ?ghting against SARS. Despite this 176 papers were submitted to the conference from 22 countries and regions, and after a competitive selection process, 37 papers from 14 countries and regions were accepted to appear in the proceedings and be presented at ICICS 2003. We would like to take this opportunity to thank all those who submitted papers to ICICS 2003 for their valued contribution to the conference.


TCP/IP communication cryptography finite field information security verification

Editors and affiliations

  • Sihan Qing
    • 1
  • Dieter Gollmann
    • 2
  • Jianying Zhou
    • 3
  1. 1.Institute of SoftwearChinese Academy of SciencesBeijingChina
  2. 2.Institute for Security in Distributed ApplicationsHamburg University of TechnologyHamburgGermany
  3. 3.Cryptography and Security Department Institute for Infocomm ResearchSingapore

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-20150-2
  • Online ISBN 978-3-540-39927-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site