Skip to main content
  • Conference proceedings
  • © 2009

Information and Communications Security

11th International Conference, ICICS 2009

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5927)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2009.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (39 papers)

  1. Front Matter

  2. Cryptanalysis

    1. Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform

      • Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, Kazuo Ohta
      Pages 3-16
    2. Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher

      • Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
      Pages 17-31
  3. Algorithms and Implementations

    1. The rakaposhi Stream Cipher

      • Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara
      Pages 32-46
    2. Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes

      • Zhen Wang, Mark Karpovsky, Berk Sunar, Ajay Joshi
      Pages 47-62
    3. Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems

      • Manuel Koschuch, Johann Großschädl, Dan Page, Philipp Grabher, Matthias Hudler, Michael Krüger
      Pages 63-79
  4. Public Key Cryptography

    1. Online/Offline Ring Signature Scheme

      • Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou
      Pages 80-90
    2. Policy-Controlled Signatures

      • Pairat Thorncharoensri, Willy Susilo, Yi Mu
      Pages 91-106
    3. Public Key Encryption without Random Oracle Made Truly Practical

      • Puwen Wei, Xiaoyun Wang, Yuliang Zheng
      Pages 107-120
  5. Security Applications

    1. Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains

      • Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng
      Pages 150-164
    2. Biometric-Based Non-transferable Anonymous Credentials

      • Marina Blanton, William M. P. Hudelson
      Pages 165-180
  6. Software Security

    1. Secure Remote Execution of Sequential Computations

      • Ghassan O. Karame, Mario Strasser, Srdjan Čapkun
      Pages 181-197
    2. Architecture- and OS-Independent Binary-Level Dynamic Test Generation

      • Gen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang
      Pages 198-210
  7. System Security

    1. Trusted Isolation Environment: An Attestation Architecture with Usage Control Model

      • Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei Shi, Yahui Yang et al.
      Pages 226-240
    2. Denial-of-Service Attacks on Host-Based Generic Unpackers

      • Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia
      Pages 241-253

Other Volumes

  1. Information and Communications Security

About this book

The11thInternationalConferenceonInformationandCommunicationsSecurity (ICICS 2009) was held in Beijing, China during December 14–17, 2009. The ICICS conferenceseriesis anestablished forum that bringstogether people from universities,researchinstitutes, industry and governmentinstitutions, who work in a range of ?elds within information and communications security. The ICICS conferencesgiveattendeestheopportunitytoexchangenewideasandinvestigate developments in the state of the art. In previous years, ICICS has taken place in the UK (2008), China (2007, 2005, 2003, 2001 and 1997), USA (2006), Spain (2004), Singapore (2002), and Australia (1999). On each occasion, as on this one, the proceedings have been published in the Springer LNCS series. In total, 162 manuscripts from 20 countries and districts were submitted to ICICS 2009, and a total of 37 (31 regular papers plus 6 short papers) from 13 countries and districts were accepted (an acceptance rate of 23%). The accepted papers cover a wide range of disciplines within information security and applied cryptography. Each submission to ICICS 2009 was anonymously reviewed by three or four reviewers. We are very grateful to members of the Program C- mittee, which was composed of 44 members from 14 countries; we would like to thank them, as well as all the external referees, for their time and their valuable contributions to the tough and time-consuming reviewing process.

Editors and Affiliations

  • Institute of Software, Chinese Academy of Sciences, Beijing, China

    Sihan Qing

  • Royal Holloway, University of London, Information Security Group, Egham, United Kingdom

    Chris J. Mitchell

  • School of Computer Science, University of Birmingham, Birmingham, United Kingdom

    Guilin Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access