Information and Communications Security

13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings

  • Sihan Qing
  • Willy Susilo
  • Guilin Wang
  • Dongmei Liu
Conference proceedings ICICS 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7043)

Table of contents

  1. Front Matter
  2. Digital Signatures

    1. Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou
      Pages 1-14
  3. Public Key Encryption

    1. Song Luo, Qingni Shen, Yongming Jin, Yu Chen, Zhong Chen, Sihan Qing
      Pages 42-56
    2. Jiageng Chen, Keita Emura, Atsuko Miyaji
      Pages 57-68
  4. Cryptographic Protocols

    1. Yongming Jin, Huiping Sun, Wei Xin, Song Luo, Zhong Chen
      Pages 69-77
    2. Jean-Philippe Aumasson, Aikaterini Mitrokotsa, Pedro Peris-Lopez
      Pages 78-92
    3. Shiuan-Tzuo Shen, Wen-Guey Tzeng
      Pages 93-111
    4. Kai-Yuen Cheong, Atsuko Miyaji
      Pages 112-120
  5. Applied Cryptography

    1. Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Lei Zhang
      Pages 121-135
    2. Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, Masakazu Soshi
      Pages 143-157
  6. Multimedia Security

  7. Algorithms and Evaluation

  8. Cryptanalysis

    1. Nicolas T. Courtois, Michał Misztal
      Pages 216-227
    2. Zhiqiang Liu, Dawu Gu, Ya Liu, Juanru Li, Wei Li
      Pages 242-254
    3. Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake
      Pages 255-266
  9. Security Applications

  10. Wireless Network Security

    1. Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao
      Pages 306-318
    2. Ze Wang, Maode Ma, Wenju Liu, Xixi Wei
      Pages 319-329
  11. System Security

    1. Lian Yu, Shi-Zhong Wu, Tao Guo, Guo-Wei Dong, Cheng-Cheng Wan, Yin-Hang Jing
      Pages 330-344
    2. Cong Sun, Ennan Zhai, Zhong Chen, Jianfeng Ma
      Pages 345-359
    3. Jun Jiang, Xiaoqi Jia, Dengguo Feng, Shengzhi Zhang, Peng Liu
      Pages 360-373
  12. Network Security

    1. Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu
      Pages 388-398
    2. Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani
      Pages 399-413
  13. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011.
The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.


denial-of-service attack differential cryptanalysis oblivious transfer trust measurement wireless communication

Editors and affiliations

  • Sihan Qing
    • 1
  • Willy Susilo
    • 2
  • Guilin Wang
    • 3
  • Dongmei Liu
    • 4
  1. 1.Institute of Software, Chinese Academy of SciencesBeijingChina
  2. 2.Centre for Computer and Information Security Research, School of Computer Science and Software EngineeringUniversity of WollongongAustralia
  3. 3.School of Computer Science & Software EngineeringUniversity of WollongongWollongongAustralia
  4. 4.Chinese Academy of Sciences, Institute of SoftwareBeijingChina

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-25242-6
  • Online ISBN 978-3-642-25243-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software