© 2005

Information and Communications Security

7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings

  • Sihan Qing
  • Wenbo Mao
  • Javier López
  • Guilin Wang
Conference proceedings ICICS 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3783)

Table of contents

  1. Front Matter
  2. Fair Exchange

    1. Kenji Imamoto, Jianying Zhou, Kouichi Sakurai
      Pages 1-13
    2. Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou
      Pages 14-26
    3. Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai
      Pages 40-52
  3. Digital Signatures I

    1. Shuhong Wang, Feng Bao, Robert H. Deng
      Pages 53-60
    2. Yong Li, Helger Lipmaa, Dingyi Pei
      Pages 61-71
    3. Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka
      Pages 72-83
  4. Cryptographic Protocols

    1. Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
      Pages 84-96
    2. Sven Laur, Helger Lipmaa, Taneli Mielikäinen
      Pages 97-111
    3. Hidenori Kuwakado, Masakatu Morii, Hatsukazu Tanaka
      Pages 112-122
    4. Alaaeddine Fellah, John Mullins
      Pages 123-135
  5. Cryptanalysis

    1. Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee
      Pages 147-158
    2. Bok-Min Goi, Jintai Ding, M. U. Siddiqi
      Pages 159-168
  6. Digital Signatures II

  7. Network Security

    1. Xin Li, Zhenzhou Ji, Mingzeng Hu
      Pages 220-230

About these proceedings


The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The ?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydney, Australia; ICICS 2001 in Xi’an, China; ICICS 2002 in Singapore; ICICS 2003 in Hohhot City, China; and ICICS 2004 in Malaga, Spain. The conference proceedings of the past events have - ways been published by Springer in the Lecture Notes in Computer Science series, with volume numbers, respectively: LNCS 1334,LNCS 1726,LNCS 2229, LNCS 2513, LNCS 2836, and LNCS 3269. ICICS 2005 was sponsored by the Chinese Academy of Sciences (CAS); the Beijing Natural Science Foundation of China under Grant No. 4052016; the National Natural Science Foundation of China under Grants No. 60083007 and No. 60573042;the NationalGrandFundamentalResearch973ProgramofChina under Grant No. G1999035802, and Hewlett-Packard Laboratories, China. The conference was organized and hosted by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conference series has been to o?er the attendees the opportunity to discuss the latest developments in theoretical and practical - pects of information and communications security.


DoS attacks Information Signatur access control anonymity communication configuration cryptanalysis cryptographic protocols digital signatures information security security security technology trust watermarking

Editors and affiliations

  • Sihan Qing
    • 1
  • Wenbo Mao
    • 2
  • Javier López
    • 3
  • Guilin Wang
    • 4
  1. 1.Institute of SoftwearChinese Academy of SciencesBeijingChina
  2. 2.Hewlett-Packard LaboratoriesBristolUK
  3. 3.University of A CoruñaDepartment of Information and Communication TechnologiesSpain
  4. 4.School of Computer ScienceUniversity of BirminghamB15 2TTUK

Bibliographic information