Advertisement

Information and Communications Security

9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings

  • Sihan Qing
  • Hideki Imai
  • Guilin Wang

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4861)

Table of contents

  1. Front Matter
  2. Authentication and Key Exchange

    1. Charalampos Papamanthou, Roberto Tamassia
      Pages 1-15
    2. Lan Zhou, Willy Susilo, Yi Mu
      Pages 16-30
    3. Haimin Jin, Duncan S. Wong, Yinlong Xu
      Pages 44-56
  3. Digital Signatures

    1. Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu et al.
      Pages 57-68
    2. Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
      Pages 69-82
    3. Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
      Pages 83-97
  4. Applications

    1. Peishun Wang, Huaxiong Wang, Josef Pieprzyk
      Pages 98-112
    2. Zhengyi Le, Yi Ouyang, Yurong Xu, James Ford, Fillia Makedon
      Pages 113-125
    3. Zhen Li, Xiaojun Ye
      Pages 141-152
  5. Watermarking

    1. Chin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu
      Pages 164-176
  6. Fast Implementations

    1. Qianli Zhang, Jilong Wang, Xing Li
      Pages 177-188
    2. Abdulah Abdulah Zadeh
      Pages 189-200
    3. Zongwei Zhou, Yibo Xue, Junda Liu, Wei Zhang, Jun Li
      Pages 201-215
    4. Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani
      Pages 216-229
  7. Applied Cryptography

  8. Cryptanalysis

    1. Lei Duo, Chao Li, Keqin Feng
      Pages 269-283
    2. Hua Chen, Wenling Wu, Dengguo Feng
      Pages 284-295
    3. Scott Contini, Krystian Matusiewicz, Josef Pieprzyk
      Pages 296-305
  9. Formal Analysis

    1. David Nowak
      Pages 319-333
    2. Masayuki Terada, Kazuki Yoneyama, Sadayuki Hongo, Kazuo Ohta
      Pages 350-361
  10. System Security I

    1. Patrick Röder, Omid Tafreschi, Fredrik Mellgren, Claudia Eckert
      Pages 362-374
    2. Anna C. Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis
      Pages 386-397
  11. System Security II

    1. Yan Wen, Jinjing Zhao, Huaimin Wang
      Pages 398-411
    2. Chang-Hsien Tsai, Shih-Kun Huang
      Pages 412-426
    3. ZhenLiu Zhou, RongSheng Xu
      Pages 427-437
    4. Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou
      Pages 438-451
  12. Network Security

    1. Liying Li, Jianying Zhou, Ning Xiao
      Pages 452-466
    2. Ying Qiu, Feng Bao, Jianying Zhou
      Pages 467-479
    3. James J. Treinen, Ramakrishna Thurimella
      Pages 480-494
    4. Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
      Pages 495-506
  13. Back Matter

About these proceedings

Keywords

AES DoS attacks access control communication cryptanalysis cryptographic protocols cryptography digital watermark information information security malware network sec network security security

Editors and affiliations

  • Sihan Qing
    • 1
  • Hideki Imai
    • 2
  • Guilin Wang
    • 3
  1. 1.Institute of SoftwearChinese Academy of SciencesBeijingChina
  2. 2.Research Center for Information Security (RCIS),National Institute of Advanced Industrial Science and Technology, AISTJapan
  3. 3.School of Computer ScienceUniversity of BirminghamBirminghamUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-77048-0
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-77047-3
  • Online ISBN 978-3-540-77048-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site