Information and Communications Security

Third International Conference, ICICS 2001 Xian, China, November 13–16, 2001 Proceedings

  • Sihan Qing
  • Tatsuaki Okamoto
  • Jianying Zhou
Conference proceedings ICICS 2001

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2229)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Dongxi Liu, Xiaoyong Li, Yingcai Bai
    Pages 13-22
  3. Kishan Chand Gupta, Subhamoy Maitra
    Pages 23-34
  4. Bo Yang, Shixiong Zhu, Yumin Wang
    Pages 35-41
  5. Chin-Chen Chang, Iuon-Chang Lin
    Pages 42-46
  6. Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi
    Pages 62-73
  7. Fangguo Zhang, Futai Zhang, Yumin Wang
    Pages 74-83
  8. Dingfeng Ye, Junhui Yang, Zongduo Dai, Haiwen Ou
    Pages 84-89
  9. Hee-Wan Kim, Hae-Kyung Rhee, Tai M. Chung, Young Ik Eom, Ung-Mo Kim
    Pages 107-118
  10. Sungbaek Cho, Zbigniew Ciechanowicz
    Pages 119-130
  11. Michael Hitchens, Vijay Varadharajan
    Pages 131-143
  12. Xian-Mo Zhang, Josef Pieprzyk
    Pages 144-149
  13. Gideon Samid
    Pages 150-154
  14. Zhimin Song, Sihan Qing
    Pages 155-166
  15. Ian Herwono, Ingo Liebhardt
    Pages 167-171
  16. Carlos Ribeiro, André Zúquete, Paulo Ferreira
    Pages 172-176
  17. Jianying Zhou, Chunfu Tan
    Pages 189-201
  18. Feng Bao, Robert Deng
    Pages 202-213
  19. Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou
    Pages 221-232
  20. Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang
    Pages 233-237
  21. Yeping He, Sihan Qing
    Pages 238-245
  22. Lin You, Yi Xian Yang, Chun Qi Zhang
    Pages 246-250
  23. Bruno Crispo, Giancarlo Ruffo
    Pages 251-260
  24. Gang Pan, Yijun Wu, Zhaohui Wu
    Pages 261-270
  25. C.-H. Lee, X. Deng, H. Zhu
    Pages 271-279
  26. Shigeta Kuninobu, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue
    Pages 292-303
  27. Yongyuth Permpoontanalarp, Chaiwat Rujimethabhas
    Pages 328-339
  28. Yan Chen, Adam Bargteil, David Bindel, Randy H. Katz, John Kubiatowicz
    Pages 340-351
  29. Juan Manuel González Nieto, Colin Boyd, Ed Dawson
    Pages 352-363
  30. Wenjian Luo, Xianbin Cao, Xufa Wang
    Pages 371-375
  31. Oscar Cánovas, Antonio F. Gómez
    Pages 376-380
  32. Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
    Pages 381-385
  33. Yan Wang, Kian-Lee Tan
    Pages 386-397
  34. Yu Chen, Qian Fang, Zhihui Du, Zhenchun Huang, Sanli Li
    Pages 398-407
  35. Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
    Pages 408-418
  36. Kencheng Zeng, Chung-Huang Yang, T.R.N. Rao
    Pages 419-428
  37. Eric Disson, Danielle Boulanger, Gilles Dubois
    Pages 429-440

About these proceedings


ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi’an, China, 13-16 November 2001. Among the preceding conferences, ICICS’97 was held in Beijing, China, 11-14 November 1997 and ICICS’99 in Sydney, Australia, 9-11 November 1999. The ICICS’97 and ICICS’99 proceedings were released as volumes 1334 and 1726 of Springer- Verlag’s Lecture Notes in Computer Science series. ICICS 2001 was sponsored by the Chinese Academy of Sciences (CAS), the - tional Natural Science Foundation of China, and the China Computer Fe- ration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Association for Cryptologic Re- arch (IACR), the International Communications and Information Security - sociation (ICISA), and the Asiacrypt Steering Committee. The format of ICICS 2001 was selected to cover the complete spectrum of - formation and communications security, and to promote participant interaction. The sessions were designed to promote interaction between the major topics of the conference: theoretical foundations of security, secret sharing, network - curity, authentication and identi?cation, boolean functions and stream ciphers, security evaluation, signatures, block ciphers and public-key systems, infor- tion hiding, protocols and their analysis, and cryptanalysis. The 29-member Program Committee considered 134 submissions from 23 di- rent countries and regions, among them 56 papers were accepted for presentation.


Authentication Boolean function Code Computational Algebra Cryptographic Algorithms Data Security Digital Communication Digital Signature Schemes Error-correcting Code Information Information Security Internet Security Routing communication finite field

Editors and affiliations

  • Sihan Qing
    • 1
  • Tatsuaki Okamoto
    • 2
  • Jianying Zhou
    • 3
  1. 1.Engineering Research Center for Information Security Technology (ERCIST)Chinese Academy of SciencesBeijingChina
  2. 2.NTT LabsYokosuka-shiJapan
  3. 3.Oracle CorporationRedwood ShoresUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2001
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-42880-0
  • Online ISBN 978-3-540-45600-1
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site