Skip to main content
Book cover

Information and Communications Security

12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 Proceedings

  • Conference proceedings
  • © 2010

Overview

  • Unique visibility
  • State-of-the-art survey
  • Fast-track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6476)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: ICICS 2010.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (32 papers)

  1. Cryptographic Hash Functions: Theory and Practice

  2. Session 1A. Access Control

  3. Session 1B. Public Key Cryptography and Cryptanalysis

  4. Session 1C. Security in Distributed and Mobile Systems

  5. Session 1D. Cryptanalysis

  6. Session 2A. Authentication

  7. Session 2B. Fair Exchange Protocols

Other volumes

  1. Information and Communications Security

Keywords

Editors and Affiliations

  • Information Security Group, Universitat Politècnica de Catalunya, Barcelona, Spain

    Miguel Soriano

  • Institute of Software, Chinese Academy of Sciences, Beijing, China

    Sihan Qing

  • III-LIDI(Instituto de Investigación en Informática LIDI) School of Computer Sciences, National University of La Plata, La Plata, Argentina

    Javier López

Bibliographic Information

Publish with us