© 2011

Information and Communications Security

13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings

  • Sihan Qing
  • Willy Susilo
  • Guilin Wang
  • Dongmei Liu
Conference proceedings ICICS 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7043)

Table of contents

  1. Front Matter
  2. Digital Signatures

    1. Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou
      Pages 1-14
  3. Public Key Encryption

    1. Song Luo, Qingni Shen, Yongming Jin, Yu Chen, Zhong Chen, Sihan Qing
      Pages 42-56
    2. Jiageng Chen, Keita Emura, Atsuko Miyaji
      Pages 57-68
  4. Cryptographic Protocols

    1. Yongming Jin, Huiping Sun, Wei Xin, Song Luo, Zhong Chen
      Pages 69-77
    2. Jean-Philippe Aumasson, Aikaterini Mitrokotsa, Pedro Peris-Lopez
      Pages 78-92
    3. Shiuan-Tzuo Shen, Wen-Guey Tzeng
      Pages 93-111
    4. Kai-Yuen Cheong, Atsuko Miyaji
      Pages 112-120
  5. Applied Cryptography

    1. Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Lei Zhang
      Pages 121-135
    2. Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, Masakazu Soshi
      Pages 143-157
  6. Multimedia Security

  7. Algorithms and Evaluation

    1. Zhengjun Cao, Xiao Fan
      Pages 184-189
    2. Lei Wang, Jiwu Jing, Zongbin Liu, Lingchen Zhang, Wuqiong Pan
      Pages 202-215
  8. Cryptanalysis

    1. Nicolas T. Courtois, Michał Misztal
      Pages 216-227

About these proceedings


This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011.
The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.


denial-of-service attack differential cryptanalysis oblivious transfer trust measurement wireless communication

Editors and affiliations

  • Sihan Qing
    • 1
  • Willy Susilo
    • 2
  • Guilin Wang
    • 3
  • Dongmei Liu
    • 4
  1. 1.Institute of Software, Chinese Academy of SciencesBeijingChina
  2. 2.Centre for Computer and Information Security Research, School of Computer Science and Software EngineeringUniversity of WollongongAustralia
  3. 3.School of Computer Science & Software EngineeringUniversity of WollongongWollongongAustralia
  4. 4.Chinese Academy of Sciences, Institute of SoftwareBeijingChina

Bibliographic information