Information and Communications Security

11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings

  • Sihan Qing
  • Chris J. Mitchell
  • Guilin Wang
Conference proceedings ICICS 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5927)

Table of contents

  1. Front Matter
  2. Invited Talks

  3. Cryptanalysis

    1. Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, Kazuo Ohta
      Pages 3-16
    2. Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
      Pages 17-31
  4. Algorithms and Implementations

    1. Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara
      Pages 32-46
    2. Zhen Wang, Mark Karpovsky, Berk Sunar, Ajay Joshi
      Pages 47-62
    3. Manuel Koschuch, Johann Großschädl, Dan Page, Philipp Grabher, Matthias Hudler, Michael Krüger
      Pages 63-79
  5. Public Key Cryptography

    1. Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou
      Pages 80-90
    2. Pairat Thorncharoensri, Willy Susilo, Yi Mu
      Pages 91-106
    3. Puwen Wei, Xiaoyun Wang, Yuliang Zheng
      Pages 107-120
  6. Security Applications

    1. Shaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng
      Pages 150-164
    2. Marina Blanton, William M. P. Hudelson
      Pages 165-180
  7. Software Security

    1. Ghassan O. Karame, Mario Strasser, Srdjan Čapkun
      Pages 181-197
    2. Gen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang
      Pages 198-210
  8. System Security

    1. Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei Shi, Yahui Yang et al.
      Pages 226-240
    2. Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia
      Pages 241-253
  9. Network Security

  10. Short Papers I

  11. Database Security

  12. Trust Management

    1. Guangquan Xu, Zhiyong Feng, Xiaohong Li, Hutong Wu, Yongxin Yu, Shizhan Chen et al.
      Pages 385-395
    2. Yan Zhang, Zhengde Zhai, Dengguo Feng
      Pages 396-410
    3. Fuzhi Zhang, Long Bai, Feng Gao
      Pages 411-424
  13. Applied Cryptography

    1. Yi Shi, Kanta Matsuura
      Pages 425-438
    2. Chuangui Ma, Xiaofei Ding
      Pages 439-448
    3. Mitra Fatemi, Taraneh Eghlidos, Mohammadreza Aref
      Pages 449-458
    4. Xiangyang Wang, Tianxiao Ma, Panpan Niu
      Pages 459-473
  14. Short Papers II

    1. Masatoshi Noguchi, Manabu Inuma, Rie Shigetomi, Hideki Imai
      Pages 474-482
    2. Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang
      Pages 493-502
  15. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 11th International Conference on Information and Communications Security, ICICS 2009, held in Beijing, China, in December 2009.

The 37 revised full papers presented together with one invited paper were carefully reviewed and selected from 162 submissions. The papers are organized in topical sections on cryptanalysis, algorithms and implemantations, public key cryptography, security applications, software security, system security, network security, database security, trust management, and applied cryptography.


Camellia access control algorithms anomaly detection anonymity system association rules mining authentication biometric data block cipher collaborative filtering communication cryptanalysis cryptographic protocols cryptography information

Editors and affiliations

  • Sihan Qing
    • 1
  • Chris J. Mitchell
    • 2
  • Guilin Wang
    • 3
  1. 1.Institute of SoftwareChinese Academy of SciencesBeijingChina
  2. 2.Royal HollowayUniversity of London, Information Security GroupEghamUnited Kingdom
  3. 3.School of Computer ScienceUniversity of BirminghamBirminghamUnited Kingdom

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-11144-0
  • Online ISBN 978-3-642-11145-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software