Skip to main content
Book cover

Information and Communication Security

13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011, Proceedings

  • Conference proceedings
  • © 2011

Overview

  • Up-to-date results
  • Fast track conference proceedings
  • State-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7043)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: ICICS 2011.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (33 papers)

  1. Digital Signatures

  2. Public Key Encryption

  3. Cryptographic Protocols

  4. Applied Cryptography

  5. Multimedia Security

  6. Algorithms and Evaluation

  7. Cryptanalysis

Other volumes

  1. Information and Communications Security

Keywords

About this book

This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.

Editors and Affiliations

  • Institute of Software, Chinese Academy of Sciences, Beijing, China

    Sihan Qing

  • Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Australia

    Willy Susilo

  • School of Computer Science & Software Engineering, University of Wollongong, Wollongong, Australia

    Guilin Wang

  • Chinese Academy of Sciences, Institute of Software, Beijing, China

    Dongmei Liu

Bibliographic Information

Publish with us