Information and Communications Security

12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings

  • Miguel Soriano
  • Sihan Qing
  • Javier López
Conference proceedings ICICS 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6476)

Table of contents

  1. Front Matter
  2. Cryptographic Hash Functions: Theory and Practice

  3. Session 1A. Access Control

    1. Said Oulmakhzoune, Nora Cuppens-Boulahia, Frederic Cuppens, Stephane Morucci
      Pages 4-15
    2. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss et al.
      Pages 16-30
  4. Session 1B. Public Key Cryptography and Cryptanalysis

    1. Falko Strenzke
      Pages 31-45
    2. Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil
      Pages 46-61
    3. Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferrer
      Pages 62-76
  5. Session 1C. Security in Distributed and Mobile Systems

    1. Flavio Lombardi, Roberto Di Pietro
      Pages 92-106
    2. Xinwen Zhang, Jean-Pierre Seifert, Onur Acıiçmez
      Pages 107-125
    3. Talal Alharbi, Abdullah Almuhaideb, Phu Dung Le
      Pages 126-139
    4. Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao
      Pages 140-154
  6. Session 1D. Cryptanalysis

    1. Renato Menicocci, Andrea Simonetti, Giuseppe Scotti, Alessandro Trifiletti
      Pages 155-170
    2. Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, Sampo Sovio
      Pages 171-185
  7. Session 2A. Authentication

    1. Basel Alomair, Radha Poovendran
      Pages 186-202
    2. Jiaxin Pan, Libin Wang, Changshe Ma
      Pages 203-217
    3. Alessandro Sorniotti, Refik Molva
      Pages 218-234
  8. Session 2B. Fair Exchange Protocols

    1. Gerard Draper-Gil, Jianying Zhou, Josep Lluís Ferrer-Gomila
      Pages 235-250
    2. Ming Chen, Kaigui Wu, Jie Xu, Pan He
      Pages 251-265
  9. Session 2C. Anonymity and Privacy

    1. Ralf Küsters, Tomasz Truderung, Andreas Vogt
      Pages 281-295
    2. Lucie Langer, Hugo Jonker, Wolter Pieters
      Pages 296-310
    3. Luciana Marconi, Roberto Di Pietro, Bruno Crispo, Mauro Conti
      Pages 325-339
  10. Session 2D. Software Security

    1. Ping Chen, Xiao Xing, Bing Mao, Li Xie
      Pages 340-354
    2. Jostein Jensen, Inger Anne Tøndel, Per Håkon Meland
      Pages 355-366
  11. Session 3A. Proxy Cryptosystems

    1. Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto
      Pages 383-400
    2. Song Luo, Jianbin Hu, Zhong Chen
      Pages 401-415
  12. Session 3B. Intrusion Detection Systems

    1. Rolando Salazar-Hernández, Jesús E. Díaz-Verdejo
      Pages 416-429
    2. Mohamed Ali Ayachi, Christophe Bidan, Nicolas Prigent
      Pages 430-444
    3. Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani
      Pages 445-458
    4. Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Wenjing Jia et al.
      Pages 459-471
  13. Back Matter

About these proceedings


S-Box Scantegrity access control adaptive security anonymity cryptography integrity intrusion detection mobile user network security privacy provable security telecommunication security trust management wireless networks

Editors and affiliations

  • Miguel Soriano
    • 1
  • Sihan Qing
    • 2
  • Javier López
    • 3
  1. 1.Information Security GroupUniversitat Politècnica de CatalunyaBarcelonaSpain
  2. 2.Institute of SoftwareChinese Academy of SciencesBeijingChina
  3. 3.III-LIDI(Instituto de Investigación en Informática LIDI) School of Computer SciencesNational University of La PlataLa PlataArgentina

Bibliographic information

Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment