Skip to main content
  • Conference proceedings
  • © 2005

Information and Communications Security

7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3783)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (40 papers)

  1. Front Matter

  2. Fair Exchange

    1. An Evenhanded Certified Email System for Contract Signing

      • Kenji Imamoto, Jianying Zhou, Kouichi Sakurai
      Pages 1-13
    2. Efficient ID-Based Optimistic Fair Exchange with Provable Security

      • Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou
      Pages 14-26
    3. Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery

      • Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai
      Pages 40-52
  3. Digital Signatures I

    1. Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security

      • Shuhong Wang, Feng Bao, Robert H. Deng
      Pages 53-60
    2. On Delegatability of Four Designated Verifier Signatures

      • Yong Li, Helger Lipmaa, Dingyi Pei
      Pages 61-71
    3. PIATS: A Partially Sanitizable Signature Scheme

      • Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka
      Pages 72-83
  4. Cryptographic Protocols

    1. Ciphertext Comparison, a New Solution to the Millionaire Problem

      • Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
      Pages 84-96
    2. Private Itemset Support Counting

      • Sven Laur, Helger Lipmaa, Taneli Mielikäinen
      Pages 97-111
    3. Visual Cryptographic Protocols Using the Trusted Initializer

      • Hidenori Kuwakado, Masakatu Morii, Hatsukazu Tanaka
      Pages 112-122
    4. Admissible Interference by Typing for Cryptographic Protocols

      • Alaaeddine Fellah, John Mullins
      Pages 123-135
  5. Cryptanalysis

    1. On the Security of Encryption Modes of MD4, MD5 and HAVAL

      • Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee
      Pages 147-158
    2. Cryptanalysis of PASS II and MiniPass

      • Bok-Min Goi, Jintai Ding, M. U. Siddiqi
      Pages 159-168
  6. Digital Signatures II

    1. Asymmetric Concurrent Signatures

      • Khanh Nguyen
      Pages 181-193
    2. Generic Construction of (Identity-Based) Perfect Concurrent Signatures

      • Sherman S. M. Chow, Willy Susilo
      Pages 194-206
  7. Network Security

    1. Session Table Architecture for Defending SYN Flood Attack

      • Xin Li, Zhenzhou Ji, Mingzeng Hu
      Pages 220-230

Other Volumes

  1. Information and Communications Security

About this book

The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The ?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydney, Australia; ICICS 2001 in Xi’an, China; ICICS 2002 in Singapore; ICICS 2003 in Hohhot City, China; and ICICS 2004 in Malaga, Spain. The conference proceedings of the past events have - ways been published by Springer in the Lecture Notes in Computer Science series, with volume numbers, respectively: LNCS 1334,LNCS 1726,LNCS 2229, LNCS 2513, LNCS 2836, and LNCS 3269. ICICS 2005 was sponsored by the Chinese Academy of Sciences (CAS); the Beijing Natural Science Foundation of China under Grant No. 4052016; the National Natural Science Foundation of China under Grants No. 60083007 and No. 60573042;the NationalGrandFundamentalResearch973ProgramofChina under Grant No. G1999035802, and Hewlett-Packard Laboratories, China. The conference was organized and hosted by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conference series has been to o?er the attendees the opportunity to discuss the latest developments in theoretical and practical - pects of information and communications security.

Editors and Affiliations

  • Institute of Softwear, Chinese Academy of Sciences, Beijing, China

    Sihan Qing

  • Hewlett-Packard Laboratories, Bristol, UK

    Wenbo Mao

  • University of A Coruña, Department of Information and Communication Technologies, Spain

    Javier López

  • School of Computer Science, University of Birmingham, B15 2TT, UK

    Guilin Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access