© 2006

Information and Communications Security

8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006. Proceedings

  • Peng Ning
  • Sihan Qing
  • Ninghui Li
Conference proceedings ICICS 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4307)

Table of contents

  1. Front Matter
  2. Security Protocols

  3. Applied Crytography

  4. Access Control and Systems Security

  5. Privacy and Malicious Code

    1. Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia
      Pages 190-209
    2. Yingpeng Sang, Hong Shen, Yasuo Tan, Naixue Xiong
      Pages 210-227
    3. Geir Olav Dyrkolbotn, Einar Snekkenes
      Pages 249-259
  6. Network Security

    1. Himanshu Khurana, Jin Heo, Meenal Pant
      Pages 260-281

About these proceedings


It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4–7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved in m- tiple disciplines of Information and Communications Security in order to foster exchangeof ideas. The past sevenICICS conferences wereheld in Beijing, China (ICICS 1997); Sydney, Australia (ICICS 1999); Xi’an China (ICICS 2001); S- gapore (ICICS 2002); Hohhot City, China (ICICS 2003); Malaga, Spain (ICICS 2004); and Beijing, China (ICICS 2005). The conference proceedings of the past seven events have been published by Springer in the Lecture Notes in Computer Science series, in LNCS1334,LNCS1726,LNCS2229,LNCS 2513,LNCS 2836, LNCS 3269, and LNCS 3783, respectively. This year we received a total of 119 submissions on various aspects of - hoc and sensor network security. The Program Committee selected 22 regular papers and 17 short papers that cover a variety of topics, including security protocols, applied cryptography and cryptanalysis, access control in distributed systems, privacy, malicious code, network and systems security, and security implementations. Putting together ICICS 2006 was a team e?ort. First of all, we would like to thank the authors of every paper, whether accepted or not, for submitting their papers to ICICS 2006. We would like to express our gratitude to the Program Committee members and the external reviewers, who worked very hard in - viewing the papers and providing suggestions for their improvements.


NC access control authentication control cryptoanalysis cryptographic protocol cryptography data security digital signature intrusion detection network security privacy security security protocols systems security

Editors and affiliations

  • Peng Ning
    • 1
  • Sihan Qing
    • 2
  • Ninghui Li
    • 3
  1. 1.North Carolina State UniversityRaleighUSA
  2. 2.Institute of SoftwearChinese Academy of SciencesBeijingChina
  3. 3.Purdue University 

Bibliographic information