Skip to main content
  • Conference proceedings
  • © 2008

Information and Communications Security

10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5308)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

  2. Invited Talk

    1. Attestation: Evidence and Trust

      • George Coker, Joshua Guttman, Peter Loscocco, Justin Sheehy, Brian Sniffen
      Pages 1-18
  3. Authentication

    1. Unclonable Lightweight Authentication Scheme

      • Ghaith Hammouri, Erdinç Öztürk, Berk Birand, Berk Sunar
      Pages 33-48
    2. Threat Modelling in User Performed Authentication

      • Xun Dong, John A. Clark, Jeremy L. Jacob
      Pages 49-64
  4. Side Channel Analysis

    1. Quantifying Timing Leaks and Cost Optimisation

      • Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky
      Pages 81-96
    2. Method for Detecting Vulnerability to Doubling Attacks

      • Chong Hee Kim, Jean-Jacques Quisquater
      Pages 97-110
  5. Cryptanalysis

    1. Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box

      • Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki
      Pages 128-140
    2. Analysis of Two Attacks on Reduced-Round Versions of the SMS4

      • Deniz Toz, Orr Dunkelman
      Pages 141-156
    3. Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack

      • Jiali Choy, Khoongming Khoo, Chuan-Wen Loe
      Pages 157-173
  6. Access Control

    1. Beyond User-to-User Access Control for Online Social Networks

      • Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn
      Pages 174-189
    2. Revocation Schemes for Delegation Licences

      • Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula
      Pages 190-205
    3. Reusability of Functionality-Based Application Confinement Policy Abstractions

      • Z. Cliffe Schreuders, Christian Payne
      Pages 206-221
    4. Towards Role Based Trust Management without Distributed Searching of Credentials

      • Gang Yin, Huaimin Wang, Jianquan Ouyang, Ning Zhou, Dianxi Shi
      Pages 222-237
  7. Software Security

    1. BinHunt: Automatically Finding Semantic Differences in Binary Programs

      • Debin Gao, Michael K. Reiter, Dawn Song
      Pages 238-255
    2. Enhancing Java ME Security Support with Resource Usage Monitoring

      • Alessandro Castrucci, Fabio Martinelli, Paolo Mori, Francesco Roperti
      Pages 256-266
    3. Pseudo-randomness Inside Web Browsers

      • Zhi Guan, Long Zhang, Zhong Chen, Xianghao Nan
      Pages 267-278

Other Volumes

  1. Information and Communications Security

About this book

This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ICICS 2008, held in Birmingham, UK, in October 2008. The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on authentication, side channel analysis, cryptanalysis, access control, software security, system security, applied cryptography, and security protocols.

Editors and Affiliations

  • HP Laboratories, Bristol, UK

    Liqun Chen

  • School of Computer Science, University of Birmingham, UK

    Mark D. Ryan

  • School of Computer Science, University of Birmingham, Birmingham, UK

    Guilin Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access