Skip to main content
  • Conference proceedings
  • © 2003

Information and Communications Security

5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2836)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2003.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (37 papers)

  1. Front Matter

  2. A Fast Square Root Computation Using the Frobenius Mapping

    • Wang Feng, Yasuyuki Nogami, Yoshitaka Morikawa
    Pages 1-10
  3. A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption

    • Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim
    Pages 11-21
  4. On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST

    • Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei
    Pages 34-46
  5. A Policy Based Framework for Access Control

    • Ricardo Nabhen, Edgard Jamhour, Carlos Maziero
    Pages 47-59
  6. Trading-Off Type-Inference Memory Complexity against Communication

    • Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine
    Pages 60-71
  7. Security Remarks on a Group Signature Scheme with Member Deletion

    • Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
    Pages 72-83
  8. An Efficient Known Plaintext Attack on FEA-M

    • Hongjun Wu, Feng Bao, Robert H. Deng
    Pages 84-87
  9. An Efficient Public-Key Framework

    • Jianying Zhou, Feng Bao, Robert Deng
    Pages 88-99
  10. ROCEM: Robust Certified E-mail System Based on Server-Supported Signature

    • Jong-Phil Yang, Chul Sur, Kyung Hyune Rhee
    Pages 100-111
  11. Practical Service Charge for P2P Content Distribution

    • Jose Antonio Onieva, Jianying Zhou, Javier Lopez
    Pages 112-123
  12. ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback

    • Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma
    Pages 124-135
  13. A Lattice Based General Blind Watermark Scheme

    • Yongliang Liu, Wen Gao, Zhao Wang, Shaohui Liu
    Pages 136-144
  14. Role-Based Access Control and the Access Control Matrix

    • Gregory Saunders, Michael Hitchens, Vijay Varadharajan
    Pages 145-157
  15. Research on the Collusion Estimation

    • Gang Li, Jie Yang
    Pages 170-178
  16. Protocols for Malicious Host Revocation

    • Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Pages 191-201

Other Volumes

  1. Information and Communications Security

About this book

ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 10–13 October 2003. Among the preceding conferences, ICICS’97 was held in B- jing, China, ICICS’99 in Sydney, Australia, ICICS 2001 in Xi’an, China, and ICICS 2002,in Singapore.TheproceedingswerereleasedasVolumes1334,1726, 2229, and 2513 of the LNCS series of Springer-Verlag, respectively. ICICS 2003 was sponsored by the Chinese Academy of Sciences (CAS), the National Natural Science Foundation of China, and the China Computer F- eration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conferences has been to o?er the attendees the - portunity to discuss the state-of-the-art technology in theoretical and practical aspects of information and communications security. The response to the Call forPaperswassurprising.WhenwewerepreparingtheconferencebetweenApril and May, China, including the conference venue, Huhehaote City, was ?ghting against SARS. Despite this 176 papers were submitted to the conference from 22 countries and regions, and after a competitive selection process, 37 papers from 14 countries and regions were accepted to appear in the proceedings and be presented at ICICS 2003. We would like to take this opportunity to thank all those who submitted papers to ICICS 2003 for their valued contribution to the conference.

Editors and Affiliations

  • Institute of Softwear, Chinese Academy of Sciences, Beijing, China

    Sihan Qing

  • Institute for Security in Distributed Applications, Hamburg University of Technology, Hamburg, Germany

    Dieter Gollmann

  • Cryptography and Security Department Institute for Infocomm Research, Singapore

    Jianying Zhou

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access