© 2010

Information and Communications Security

12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings

  • Miguel Soriano
  • Sihan Qing
  • Javier López
Conference proceedings ICICS 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6476)

Table of contents

  1. Front Matter
  2. Cryptographic Hash Functions: Theory and Practice

  3. Session 1A. Access Control

    1. Said Oulmakhzoune, Nora Cuppens-Boulahia, Frederic Cuppens, Stephane Morucci
      Pages 4-15
    2. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss et al.
      Pages 16-30
  4. Session 1B. Public Key Cryptography and Cryptanalysis

    1. Falko Strenzke
      Pages 31-45
    2. Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil
      Pages 46-61
    3. Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferrer
      Pages 62-76
  5. Session 1C. Security in Distributed and Mobile Systems

    1. Flavio Lombardi, Roberto Di Pietro
      Pages 92-106
    2. Xinwen Zhang, Jean-Pierre Seifert, Onur Acıiçmez
      Pages 107-125
    3. Talal Alharbi, Abdullah Almuhaideb, Phu Dung Le
      Pages 126-139
    4. Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao
      Pages 140-154
  6. Session 1D. Cryptanalysis

    1. Renato Menicocci, Andrea Simonetti, Giuseppe Scotti, Alessandro Trifiletti
      Pages 155-170
    2. Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, Sampo Sovio
      Pages 171-185
  7. Session 2A. Authentication

    1. Basel Alomair, Radha Poovendran
      Pages 186-202
    2. Jiaxin Pan, Libin Wang, Changshe Ma
      Pages 203-217
    3. Alessandro Sorniotti, Refik Molva
      Pages 218-234
  8. Session 2B. Fair Exchange Protocols

    1. Gerard Draper-Gil, Jianying Zhou, Josep Lluís Ferrer-Gomila
      Pages 235-250
    2. Ming Chen, Kaigui Wu, Jie Xu, Pan He
      Pages 251-265

About these proceedings


S-Box Scantegrity access control adaptive security anonymity cryptography integrity intrusion detection mobile user network security privacy provable security telecommunication security trust management wireless networks

Editors and affiliations

  • Miguel Soriano
    • 1
  • Sihan Qing
    • 2
  • Javier López
    • 3
  1. 1.Information Security GroupUniversitat Politècnica de CatalunyaBarcelonaSpain
  2. 2.Institute of SoftwareChinese Academy of SciencesBeijingChina
  3. 3.III-LIDI(Instituto de Investigación en Informática LIDI) School of Computer SciencesNational University of La PlataLa PlataArgentina

Bibliographic information