Skip to main content
  • Conference proceedings
  • © 2010

Information and Communications Security

12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 Proceedings

  • Unique visibility

  • State-of-the-art survey

  • Fast-track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6476)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2010.

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-17650-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.00
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (32 papers)

  1. Front Matter

  2. Cryptographic Hash Functions: Theory and Practice

  3. Session 1A. Access Control

    1. Rewriting of SPARQL/Update Queries for Securing Data Access

      • Said Oulmakhzoune, Nora Cuppens-Boulahia, Frederic Cuppens, Stephane Morucci
      Pages 4-15
    2. Fine-Grained Disclosure of Access Policies

      • Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss et al.
      Pages 16-30
  4. Session 1B. Public Key Cryptography and Cryptanalysis

    1. Manger’s Attack Revisited

      • Falko Strenzke
      Pages 31-45
    2. Horizontal Correlation Analysis on Exponentiation

      • Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil
      Pages 46-61
    3. Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts

      • Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferrer
      Pages 62-76
  5. Session 1C. Security in Distributed and Mobile Systems

    1. CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization

      • Flavio Lombardi, Roberto Di Pietro
      Pages 92-106
    2. SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms

      • Xinwen Zhang, Jean-Pierre Seifert, Onur Acıiçmez
      Pages 107-125
    3. Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol

      • Talal Alharbi, Abdullah Almuhaideb, Phu Dung Le
      Pages 126-139
    4. Compromise-Resilient Anti-jamming for Wireless Sensor Networks

      • Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao
      Pages 140-154
  6. Session 1D. Cryptanalysis

    1. On Practical Second-Order Power Analysis Attacks for Block Ciphers

      • Renato Menicocci, Andrea Simonetti, Giuseppe Scotti, Alessandro Trifiletti
      Pages 155-170
    2. Consecutive S-box Lookups: A Timing Attack on SNOW 3G

      • Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, Sampo Sovio
      Pages 171-185
  7. Session 2A. Authentication

    1. Efficient Authentication for Mobile and Pervasive Computing

      • Basel Alomair, Radha Poovendran
      Pages 186-202
    2. Security Enhancement and Modular Treatment towards Authenticated Key Exchange

      • Jiaxin Pan, Libin Wang, Changshe Ma
      Pages 203-217
    3. Federated Secret Handshakes with Support for Revocation

      • Alessandro Sorniotti, Refik Molva
      Pages 218-234
  8. Session 2B. Fair Exchange Protocols

    1. An Agent-Mediated Fair Exchange Protocol

      • Gerard Draper-Gil, Jianying Zhou, Josep Lluís Ferrer-Gomila
      Pages 235-250
    2. A New Method for Formalizing Optimistic Fair Exchange Protocols

      • Ming Chen, Kaigui Wu, Jie Xu, Pan He
      Pages 251-265

Other Volumes

  1. Information and Communications Security

Keywords

  • S-Box
  • Scantegrity
  • access control
  • adaptive security
  • anonymity
  • cryptography
  • integrity
  • intrusion detection
  • mobile user
  • network security
  • privacy
  • provable security
  • telecommunication security
  • trust management
  • wireless networks
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Information Security Group, Universitat Politècnica de Catalunya, Barcelona, Spain

    Miguel Soriano

  • Institute of Software, Chinese Academy of Sciences, Beijing, China

    Sihan Qing

  • III-LIDI(Instituto de Investigación en Informática LIDI) School of Computer Sciences, National University of La Plata, La Plata, Argentina

    Javier López

Bibliographic Information

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-17650-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.00
Price excludes VAT (USA)