Skip to main content
  • Conference proceedings
  • © 2008

Information and Communications Security

10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5308)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. System Security

    1. Embedding Renewable Cryptographic Keys into Continuous Noisy Data

      • Ileana Buhan, Jeroen Doumen, Pieter Hartel, Qiang Tang, Raymond Veldhuis
      Pages 294-310
    2. Automated Device Pairing for Asymmetric Pairing Scenarios

      • Nitesh Saxena, Md. Borhan Uddin
      Pages 311-327
  2. Applied Cryptography

    1. Towards an Information Theoretic Analysis of Searchable Encryption

      • Saeed Sedghi, Jeroen Doumen, Pieter Hartel, Willem Jonker
      Pages 345-360
    2. A Bootstrap Attack on Digital Watermarks in the Frequency Domain

      • Sam Behseta, Charles Lam, Robert L. Webb
      Pages 361-375
    3. Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes

      • Rabia Sirhindi, Saeed Murtaza, Mehreen Afzal
      Pages 376-386
  3. Security Protocols

    1. Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval

      • Mohamed Layouni, Maki Yoshida, Shingo Okamura
      Pages 387-402
    2. Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study

      • Mehdi Talbi, Benjamin Morin, Valérie Viet Triem Tong, Adel Bouhoula, Mohamed Mejri
      Pages 403-418
  4. Back Matter

Other Volumes

  1. Information and Communications Security

About this book

This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ICICS 2008, held in Birmingham, UK, in October 2008. The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on authentication, side channel analysis, cryptanalysis, access control, software security, system security, applied cryptography, and security protocols.

Editors and Affiliations

  • HP Laboratories, Bristol, UK

    Liqun Chen

  • School of Computer Science, University of Birmingham, UK

    Mark D. Ryan

  • School of Computer Science, University of Birmingham, Birmingham, UK

    Guilin Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access