Information and Communications Security

9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007. Proceedings

  • Sihan Qing
  • Hideki Imai
  • Guilin Wang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4861)

Table of contents

  1. Front Matter
  2. Authentication and Key Exchange

    1. Charalampos Papamanthou, Roberto Tamassia
      Pages 1-15
    2. Lan Zhou, Willy Susilo, Yi Mu
      Pages 16-30
    3. Haimin Jin, Duncan S. Wong, Yinlong Xu
      Pages 44-56
  3. Digital Signatures

    1. Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu et al.
      Pages 57-68
    2. Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
      Pages 69-82
    3. Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
      Pages 83-97
  4. Applications

    1. Peishun Wang, Huaxiong Wang, Josef Pieprzyk
      Pages 98-112
    2. Zhengyi Le, Yi Ouyang, Yurong Xu, James Ford, Fillia Makedon
      Pages 113-125
    3. Zhen Li, Xiaojun Ye
      Pages 141-152
  5. Watermarking

    1. Chin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu
      Pages 164-176
  6. Fast Implementations

    1. Qianli Zhang, Jilong Wang, Xing Li
      Pages 177-188
    2. Abdulah Abdulah Zadeh
      Pages 189-200
    3. Zongwei Zhou, Yibo Xue, Junda Liu, Wei Zhang, Jun Li
      Pages 201-215
    4. Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani
      Pages 216-229
  7. Applied Cryptography

About these proceedings

Keywords

AES DoS attacks access control communication cryptanalysis cryptographic protocols cryptography digital watermark information information security malware network sec network security security

Editors and affiliations

  • Sihan Qing
    • 1
  • Hideki Imai
    • 2
  • Guilin Wang
    • 3
  1. 1.Institute of SoftwearChinese Academy of SciencesBeijingChina
  2. 2.Research Center for Information Security (RCIS),National Institute of Advanced Industrial Science and Technology, AISTJapan
  3. 3.School of Computer ScienceUniversity of BirminghamBirminghamUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-77048-0
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-77047-3
  • Online ISBN 978-3-540-77048-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book