Security and Cryptology

Information and Communications Security

8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings

Editors: Ning, Peng, Li, Ninghui (Eds.)

Buy this book

eBook $109.00
price for USA (gross)
  • ISBN 978-3-540-49497-3
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $149.00
price for USA
  • ISBN 978-3-540-49496-6
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4–7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved in m- tiple disciplines of Information and Communications Security in order to foster exchangeof ideas. The past sevenICICS conferences wereheld in Beijing, China (ICICS 1997); Sydney, Australia (ICICS 1999); Xi’an China (ICICS 2001); S- gapore (ICICS 2002); Hohhot City, China (ICICS 2003); Malaga, Spain (ICICS 2004); and Beijing, China (ICICS 2005). The conference proceedings of the past seven events have been published by Springer in the Lecture Notes in Computer Science series, in LNCS1334,LNCS1726,LNCS2229,LNCS 2513,LNCS 2836, LNCS 3269, and LNCS 3783, respectively. This year we received a total of 119 submissions on various aspects of - hoc and sensor network security. The Program Committee selected 22 regular papers and 17 short papers that cover a variety of topics, including security protocols, applied cryptography and cryptanalysis, access control in distributed systems, privacy, malicious code, network and systems security, and security implementations. Putting together ICICS 2006 was a team e?ort. First of all, we would like to thank the authors of every paper, whether accepted or not, for submitting their papers to ICICS 2006. We would like to express our gratitude to the Program Committee members and the external reviewers, who worked very hard in - viewing the papers and providing suggestions for their improvements.

Table of contents (39 chapters)

  • Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer

    Lim, Chae Hoon (et al.)

    Pages 1-20

  • A Robust and Secure RFID-Based Pedigree System (Short Paper)

    Tan, Chiu C. (et al.)

    Pages 21-29

  • A Topological Condition for Solving Fair Exchange in Byzantine Environments

    Garbinato, Benoît (et al.)

    Pages 30-49

  • A Security Analysis of the Precise Time Protocol (Short Paper)

    Tsang, Jeanette (et al.)

    Pages 50-59

  • An Identity-Based Proxy Signature Scheme from Pairings

    Shim, Kyung-Ah

    Pages 60-71

Buy this book

eBook $109.00
price for USA (gross)
  • ISBN 978-3-540-49497-3
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $149.00
price for USA
  • ISBN 978-3-540-49496-6
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Information and Communications Security
Book Subtitle
8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings
Editors
  • Peng Ning
  • Ninghui Li
Series Title
Security and Cryptology
Series Volume
4307
Copyright
2006
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-49497-3
DOI
10.1007/11935308
Softcover ISBN
978-3-540-49496-6
Edition Number
1
Number of Pages
XIV, 562
Topics