Skip to main content
  • Conference proceedings
  • © 2008

Information and Communications Security

10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5308)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2008.

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-88625-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 54.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (28 papers)

  1. Front Matter

  2. Invited Talk

    1. Attestation: Evidence and Trust

      • George Coker, Joshua Guttman, Peter Loscocco, Justin Sheehy, Brian Sniffen
      Pages 1-18
  3. Authentication

    1. Unclonable Lightweight Authentication Scheme

      • Ghaith Hammouri, Erdinç Ă–ztĂĽrk, Berk Birand, Berk Sunar
      Pages 33-48
    2. Threat Modelling in User Performed Authentication

      • Xun Dong, John A. Clark, Jeremy L. Jacob
      Pages 49-64
  4. Side Channel Analysis

    1. Quantifying Timing Leaks and Cost Optimisation

      • Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky
      Pages 81-96
    2. Method for Detecting Vulnerability to Doubling Attacks

      • Chong Hee Kim, Jean-Jacques Quisquater
      Pages 97-110
  5. Cryptanalysis

    1. Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box

      • Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki
      Pages 128-140
    2. Analysis of Two Attacks on Reduced-Round Versions of the SMS4

      • Deniz Toz, Orr Dunkelman
      Pages 141-156
    3. Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack

      • Jiali Choy, Khoongming Khoo, Chuan-Wen Loe
      Pages 157-173
  6. Access Control

    1. Beyond User-to-User Access Control for Online Social Networks

      • Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn
      Pages 174-189
    2. Revocation Schemes for Delegation Licences

      • Meriam Ben-Ghorbel-Talbi, FrĂ©dĂ©ric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula
      Pages 190-205
    3. Reusability of Functionality-Based Application Confinement Policy Abstractions

      • Z. Cliffe Schreuders, Christian Payne
      Pages 206-221
    4. Towards Role Based Trust Management without Distributed Searching of Credentials

      • Gang Yin, Huaimin Wang, Jianquan Ouyang, Ning Zhou, Dianxi Shi
      Pages 222-237
  7. Software Security

    1. BinHunt: Automatically Finding Semantic Differences in Binary Programs

      • Debin Gao, Michael K. Reiter, Dawn Song
      Pages 238-255
    2. Enhancing Java ME Security Support with Resource Usage Monitoring

      • Alessandro Castrucci, Fabio Martinelli, Paolo Mori, Francesco Roperti
      Pages 256-266
    3. Pseudo-randomness Inside Web Browsers

      • Zhi Guan, Long Zhang, Zhong Chen, Xianghao Nan
      Pages 267-278

Other Volumes

  1. Information and Communications Security

About this book

This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ICICS 2008, held in Birmingham, UK, in October 2008. The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on authentication, side channel analysis, cryptanalysis, access control, software security, system security, applied cryptography, and security protocols.

Keywords

  • communication
  • cryptography
  • information
  • pairing
  • pgp
  • pseudo random
  • sha-3
  • signature
  • watermarks
  • algorithm analysis and problem complexity

Editors and Affiliations

  • HP Laboratories, Bristol, UK

    Liqun Chen

  • School of Computer Science, University of Birmingham, UK

    Mark D. Ryan

  • School of Computer Science, University of Birmingham, Birmingham, UK

    Guilin Wang

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-88625-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 54.99
Price excludes VAT (USA)