Information and Communications Security

11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings

  • Sihan Qing
  • Chris J. Mitchell
  • Guilin Wang
Conference proceedings ICICS 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5927)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Cryptanalysis

    1. Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, Kazuo Ohta
      Pages 3-16
    2. Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
      Pages 17-31
  4. Algorithms and Implementations

    1. Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara
      Pages 32-46
    2. Zhen Wang, Mark Karpovsky, Berk Sunar, Ajay Joshi
      Pages 47-62
    3. Manuel Koschuch, Johann Großschädl, Dan Page, Philipp Grabher, Matthias Hudler, Michael Krüger
      Pages 63-79
  5. Public Key Cryptography

    1. Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou
      Pages 80-90
    2. Pairat Thorncharoensri, Willy Susilo, Yi Mu
      Pages 91-106
    3. Puwen Wei, Xiaoyun Wang, Yuliang Zheng
      Pages 107-120
  6. Security Applications

    1. Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng
      Pages 150-164
    2. Marina Blanton, William M. P. Hudelson
      Pages 165-180
  7. Software Security

    1. Ghassan O. Karame, Mario Strasser, Srdjan Čapkun
      Pages 181-197
    2. Gen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang
      Pages 198-210
  8. System Security

    1. Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei Shi, Yahui Yang et al.
      Pages 226-240
    2. Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia
      Pages 241-253

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Conference on Information and Communications Security, ICICS 2009, held in Beijing, China, in December 2009.

The 37 revised full papers presented together with one invited paper were carefully reviewed and selected from 162 submissions. The papers are organized in topical sections on cryptanalysis, algorithms and implemantations, public key cryptography, security applications, software security, system security, network security, database security, trust management, and applied cryptography.

Keywords

Camellia access control algorithms anomaly detection anonymity system association rules mining authentication biometric data block cipher collaborative filtering communication cryptanalysis cryptographic protocols cryptography information

Editors and affiliations

  • Sihan Qing
    • 1
  • Chris J. Mitchell
    • 2
  • Guilin Wang
    • 3
  1. 1.Institute of SoftwareChinese Academy of SciencesBeijingChina
  2. 2.Royal HollowayUniversity of London, Information Security GroupEghamUnited Kingdom
  3. 3.School of Computer ScienceUniversity of BirminghamBirminghamUnited Kingdom

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-11145-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-11144-0
  • Online ISBN 978-3-642-11145-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book