Skip to main content
  • Conference proceedings
  • © 2007

Information and Communications Security

9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4861)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (38 papers)

  1. Front Matter

  2. Authentication and Key Exchange

    1. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures

      • Charalampos Papamanthou, Roberto Tamassia
      Pages 1-15
    2. New Construction of Group Secret Handshakes Based on Pairings

      • Lan Zhou, Willy Susilo, Yi Mu
      Pages 16-30
    3. An Efficient Password-Only Two-Server Authenticated Key Exchange System

      • Haimin Jin, Duncan S. Wong, Yinlong Xu
      Pages 44-56
  3. Digital Signatures

    1. Formal Definition and Construction of Nominative Signature

      • Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu et al.
      Pages 57-68
    2. Short Group Signature Without Random Oracles

      • Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
      Pages 69-82
    3. (Convertible) Undeniable Signatures Without Random Oracles

      • Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
      Pages 83-97
  4. Applications

    1. A New Dynamic Accumulator for Batch Updates

      • Peishun Wang, Huaxiong Wang, Josef Pieprzyk
      Pages 98-112
    2. Preventing Unofficial Information Propagation

      • Zhengyi Le, Yi Ouyang, Yurong Xu, James Ford, Fillia Makedon
      Pages 113-125
    3. Privacy Protection on Multiple Sensitive Attributes

      • Zhen Li, Xiaojun Ye
      Pages 141-152
  5. Watermarking

    1. A Semi-blind Watermarking Based on Discrete Wavelet Transform

      • Chin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu
      Pages 164-176
  6. Fast Implementations

    1. On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme

      • Qianli Zhang, Jilong Wang, Xing Li
      Pages 177-188
    2. High Speed Modular Divider Based on GCD Algorithm

      • Abdulah Abdulah Zadeh
      Pages 189-200
    3. MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set

      • Zongwei Zhou, Yibo Xue, Junda Liu, Wei Zhang, Jun Li
      Pages 201-215
    4. Compact and Secure Design of Masked AES S-Box

      • Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani
      Pages 216-229
  7. Applied Cryptography

    1. Boudot’s Range-Bounded Commitment Scheme Revisited

      • Zhengjun Cao, Lihua Liu
      Pages 230-238

Other Volumes

  1. Information and Communications Security

Editors and Affiliations

  • Institute of Softwear, Chinese Academy of Sciences, Beijing, China

    Sihan Qing

  • Research Center for Information Security (RCIS),, National Institute of Advanced Industrial Science and Technology, AIST, Japan

    Hideki Imai

  • School of Computer Science, University of Birmingham, Birmingham, UK

    Guilin Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access