Skip to main content
  • Conference proceedings
  • © 2006

Information and Communications Security

8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4307)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2006.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (39 papers)

  1. Front Matter

  2. Security Protocols

    1. A Security Analysis of the Precise Time Protocol (Short Paper)

      • Jeanette Tsang, Konstantin Beznosov
      Pages 50-59
  3. Applied Crytography

    1. Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)

      • Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng
      Pages 82-91
    2. Trace-Driven Cache Attacks on AES (Short Paper)

      • Onur Acıiçmez, Çetin Kaya Koç
      Pages 112-121
  4. Access Control and Systems Security

    1. An Operating System Design for the Security Architecture for Microprocessors

      • Jörg Platte, Raúl Durán Díaz, Edwin Naroska
      Pages 174-189
  5. Privacy and Malicious Code

    1. Point-Based Trust: Define How Much Privacy Is Worth

      • Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia
      Pages 190-209
    2. Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets

      • Yingpeng Sang, Hong Shen, Yasuo Tan, Naixue Xiong
      Pages 210-227
    3. A Wireless Covert Channel on Smart Cards (Short Paper)

      • Geir Olav Dyrkolbotn, Einar Snekkenes
      Pages 249-259
  6. Network Security

    1. From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution

      • Himanshu Khurana, Jin Heo, Meenal Pant
      Pages 260-281

Other Volumes

  1. Information and Communications Security

About this book

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4–7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved in m- tiple disciplines of Information and Communications Security in order to foster exchangeof ideas. The past sevenICICS conferences wereheld in Beijing, China (ICICS 1997); Sydney, Australia (ICICS 1999); Xi’an China (ICICS 2001); S- gapore (ICICS 2002); Hohhot City, China (ICICS 2003); Malaga, Spain (ICICS 2004); and Beijing, China (ICICS 2005). The conference proceedings of the past seven events have been published by Springer in the Lecture Notes in Computer Science series, in LNCS1334,LNCS1726,LNCS2229,LNCS 2513,LNCS 2836, LNCS 3269, and LNCS 3783, respectively. This year we received a total of 119 submissions on various aspects of - hoc and sensor network security. The Program Committee selected 22 regular papers and 17 short papers that cover a variety of topics, including security protocols, applied cryptography and cryptanalysis, access control in distributed systems, privacy, malicious code, network and systems security, and security implementations. Putting together ICICS 2006 was a team e?ort. First of all, we would like to thank the authors of every paper, whether accepted or not, for submitting their papers to ICICS 2006. We would like to express our gratitude to the Program Committee members and the external reviewers, who worked very hard in - viewing the papers and providing suggestions for their improvements.

Editors and Affiliations

  • North Carolina State University, Raleigh, USA

    Peng Ning

  • Institute of Softwear, Chinese Academy of Sciences, Beijing, China

    Sihan Qing

  • Purdue University,  

    Ninghui Li

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access