© 2008

Information and Communications Security

10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings

  • Liqun Chen
  • Mark D. Ryan
  • Guilin Wang
Conference proceedings ICICS 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5308)

Table of contents

  1. Front Matter
  2. Invited Talk

    1. George Coker, Joshua Guttman, Peter Loscocco, Justin Sheehy, Brian Sniffen
      Pages 1-18
  3. Authentication

    1. Ghaith Hammouri, Erdinç Öztürk, Berk Birand, Berk Sunar
      Pages 33-48
    2. Xun Dong, John A. Clark, Jeremy L. Jacob
      Pages 49-64
  4. Side Channel Analysis

    1. Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky
      Pages 81-96
    2. Chong Hee Kim, Jean-Jacques Quisquater
      Pages 97-110
  5. Cryptanalysis

    1. Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki
      Pages 128-140
    2. Deniz Toz, Orr Dunkelman
      Pages 141-156
    3. Jiali Choy, Khoongming Khoo, Chuan-Wen Loe
      Pages 157-173
  6. Access Control

    1. Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn
      Pages 174-189
    2. Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula
      Pages 190-205
    3. Z. Cliffe Schreuders, Christian Payne
      Pages 206-221
    4. Gang Yin, Huaimin Wang, Jianquan Ouyang, Ning Zhou, Dianxi Shi
      Pages 222-237
  7. Software Security

    1. Debin Gao, Michael K. Reiter, Dawn Song
      Pages 238-255
    2. Alessandro Castrucci, Fabio Martinelli, Paolo Mori, Francesco Roperti
      Pages 256-266
    3. Zhi Guan, Long Zhang, Zhong Chen, Xianghao Nan
      Pages 267-278
  8. System Security

About these proceedings


This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ICICS 2008, held in Birmingham, UK, in October 2008.

The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on authentication, side channel analysis, cryptanalysis, access control, software security, system security, applied cryptography, and security protocols.


communication cryptography information pairing pgp pseudo random sha-3 signature watermarks

Editors and affiliations

  • Liqun Chen
    • 1
  • Mark D. Ryan
    • 2
  • Guilin Wang
    • 3
  1. 1.HP LaboratoriesBristolUK
  2. 2.School of Computer ScienceUniversity of BirminghamUK
  3. 3.School of Computer ScienceUniversity of BirminghamBirminghamUK

Bibliographic information