13. ICICS 2011: Beijing, China

Digital Signatures

Public Key Encryption

Cryptographic Protocols

Applied Cryptography

Multimedia Security

Algorithms and Evaluation

Cryptanalysis

Security Applications

Wireless Network Security

System Security

Network Security