Information and Communications Security

7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings

  • Sihan Qing
  • Wenbo Mao
  • Javier López
  • Guilin Wang
Conference proceedings ICICS 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3783)

Table of contents

  1. Front Matter
  2. Fair Exchange

    1. Kenji Imamoto, Jianying Zhou, Kouichi Sakurai
      Pages 1-13
    2. Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou
      Pages 14-26
    3. Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai
      Pages 40-52
  3. Digital Signatures I

    1. Shuhong Wang, Feng Bao, Robert H. Deng
      Pages 53-60
    2. Yong Li, Helger Lipmaa, Dingyi Pei
      Pages 61-71
    3. Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka
      Pages 72-83
  4. Cryptographic Protocols

    1. Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
      Pages 84-96
    2. Sven Laur, Helger Lipmaa, Taneli Mielikäinen
      Pages 97-111
    3. Hidenori Kuwakado, Masakatu Morii, Hatsukazu Tanaka
      Pages 112-122
    4. Alaaeddine Fellah, John Mullins
      Pages 123-135
  5. Cryptanalysis

    1. Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee
      Pages 147-158
    2. Bok-Min Goi, Jintai Ding, M. U. Siddiqi
      Pages 159-168
  6. Digital Signatures II

  7. Network Security

    1. Xin Li, Zhenzhou Ji, Mingzeng Hu
      Pages 220-230
    2. Song Huang, Ling Zhang, Shou-Ling Dong
      Pages 231-242
    3. Lanjia Wang, Haixin Duan, Xing Li
      Pages 243-255
    4. Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian
      Pages 256-268
  8. Applied Cryptography

    1. Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang
      Pages 280-290
    2. Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater
      Pages 291-303
  9. Key Management

  10. Access Control

    1. Lan Li, Xinghao Jiang, Jianhua Li
      Pages 336-349
    2. Pan Wang, Peng Ning, Douglas S. Reeves
      Pages 350-362
    3. Debra L. Cook, Ricardo Baratto, Angelos D. Keromytis
      Pages 363-375
  11. Applications

    1. Di Ma, Robert H. Deng, Hweehwa Pang, Jianying Zhou
      Pages 376-388
    2. Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu
      Pages 402-413
    3. Lucas Ballard, Seny Kamara, Fabian Monrose
      Pages 414-426
  12. Watermarking

    1. David Megías, Jordi Herrera-Joancomartí, Julià Minguillón
      Pages 427-440
    2. Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka
      Pages 441-453
  13. System Security

    1. Hyunsang Choi, Heejo Lee
      Pages 454-466
    2. Yi Yin, R. S. Bhuvaneswaran, Yoshiaki Katayama, Naoshi Takahashi
      Pages 467-480
    3. Jiazhu Dai, Huaikou Miao
      Pages 481-490
  14. Back Matter

About these proceedings


The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The ?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydney, Australia; ICICS 2001 in Xi’an, China; ICICS 2002 in Singapore; ICICS 2003 in Hohhot City, China; and ICICS 2004 in Malaga, Spain. The conference proceedings of the past events have - ways been published by Springer in the Lecture Notes in Computer Science series, with volume numbers, respectively: LNCS 1334,LNCS 1726,LNCS 2229, LNCS 2513, LNCS 2836, and LNCS 3269. ICICS 2005 was sponsored by the Chinese Academy of Sciences (CAS); the Beijing Natural Science Foundation of China under Grant No. 4052016; the National Natural Science Foundation of China under Grants No. 60083007 and No. 60573042;the NationalGrandFundamentalResearch973ProgramofChina under Grant No. G1999035802, and Hewlett-Packard Laboratories, China. The conference was organized and hosted by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conference series has been to o?er the attendees the opportunity to discuss the latest developments in theoretical and practical - pects of information and communications security.


DoS attacks Information Signatur access control anonymity communication configuration cryptanalysis cryptographic protocols digital signatures information security security security technology trust watermarking

Editors and affiliations

  • Sihan Qing
    • 1
  • Wenbo Mao
    • 2
  • Javier López
    • 3
  • Guilin Wang
    • 4
  1. 1.Institute of SoftwearChinese Academy of SciencesBeijingChina
  2. 2.Hewlett-Packard LaboratoriesBristolUK
  3. 3.University of A CoruñaDepartment of Information and Communication TechnologiesSpain
  4. 4.School of Computer ScienceUniversity of BirminghamB15 2TTUK

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking