Skip to main content
  • Conference proceedings
  • © 2011

Information and Communication Security

13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings

  • Up-to-date results
  • Fast track conference proceedings
  • State-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7043)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

  2. Digital Signatures

    1. Forward Secure Ring Signature without Random Oracles

      • Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou
      Pages 1-14
  3. Public Key Encryption

    1. A Variant of Boyen-Waters Anonymous IBE Scheme

      • Song Luo, Qingni Shen, Yongming Jin, Yu Chen, Zhong Chen, Sihan Qing
      Pages 42-56
    2. Non-interactive Opening for Ciphertexts Encrypted by Shared Keys

      • Jiageng Chen, Keita Emura, Atsuko Miyaji
      Pages 57-68
  4. Cryptographic Protocols

    1. Lightweight RFID Mutual Authentication Protocol against Feasible Problems

      • Yongming Jin, Huiping Sun, Wei Xin, Song Luo, Zhong Chen
      Pages 69-77
    2. A Note on a Privacy-Preserving Distance-Bounding Protocol

      • Jean-Philippe Aumasson, Aikaterini Mitrokotsa, Pedro Peris-Lopez
      Pages 78-92
    3. Delegable Provable Data Possession for Remote Data in the Clouds

      • Shiuan-Tzuo Shen, Wen-Guey Tzeng
      Pages 93-111
    4. Unconditionally Secure Oblivious Transfer Based on Channel Delays

      • Kai-Yuen Cheong, Atsuko Miyaji
      Pages 112-120
  5. Applied Cryptography

    1. Preserving Security and Privacy in Large-Scale VANETs

      • Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Lei Zhang
      Pages 121-135
    2. Ideal Secret Sharing Schemes with Share Selectability

      • Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, Masakazu Soshi
      Pages 143-157
  6. Multimedia Security

    1. Detection for Multiplicative Watermarking in DCT Domain by Cauchy Model

      • Xiang Yin, Shuoling Peng, Xinshan Zhu
      Pages 173-183
  7. Algorithms and Evaluation

    1. Extension of Barreto-Voloch Root Extraction Method

      • Zhengjun Cao, Xiao Fan
      Pages 184-189
    2. Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA

      • Lei Wang, Jiwu Jing, Zongbin Liu, Lingchen Zhang, Wuqiong Pan
      Pages 202-215
  8. Cryptanalysis

    1. First Differential Attack on Full 32-Round GOST

      • Nicolas T. Courtois, MichaÅ‚ Misztal
      Pages 216-227

Other Volumes

  1. Information and Communications Security

About this book

This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.

Editors and Affiliations

  • Institute of Software, Chinese Academy of Sciences, Beijing, China

    Sihan Qing

  • Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia

    Willy Susilo

  • School of Computer Science & Software Engineering, University of Wollongong, Wollongong, Australia

    Guilin Wang

  • Chinese Academy of Sciences, Institute of Software, Beijing, China

    Dongmei Liu

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access