𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Information and Communications Security: 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings

✍ Scribed by Fatiha Djebbar, Beghdad Ayad (auth.), Tat Wing Chim, Tsz Hon Yuen (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2012
Tongue
English
Leaves
518
Series
Lecture Notes in Computer Science 7618
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.

✦ Table of Contents


Front Matter....Pages -
Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA....Pages 105-118
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model....Pages 119-130
Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain....Pages 131-141
Perfect Ambiguous Optimistic Fair Exchange....Pages 142-153
Privacy-Preserving Noisy Keyword Search in Cloud Computing....Pages 154-166
Forward Secure Attribute-Based Signatures....Pages 167-177
On Constant-Round Precise Zero-Knowledge....Pages 178-190
Outsourcing Encryption of Attribute-Based Encryption with MapReduce....Pages 191-201
Security Enhancement of Identity-Based Identification with Reversibility....Pages 202-213
Audio Steganalysis Based on Lossless Data-Compression Techniques....Pages 1-9
Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme....Pages 10-21
Impact of the Revocation Service in PKI Prices....Pages 22-32
Cryptanalysis of Multi-Prime RSA with Small Prime Difference....Pages 33-44
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem....Pages 45-57
Improved Related-Key Differential Attacks on Reduced-Round LBlock....Pages 58-69
Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture....Pages 214-227
Permission-Based Abnormal Application Detection for Android....Pages 228-239
Countermeasures on Application Level Low-Rate Denial-of-Service Attack....Pages 70-80
Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test....Pages 81-92
Group Behavior Metrics for P2P Botnet Detection....Pages 93-104
Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data....Pages 240-251
Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis....Pages 252-263
Taint Analysis of Security Code in the KLEE Symbolic Execution Engine....Pages 264-275
Cookie-Proxy: A Scheme to Prevent SSLStrip Attack....Pages 365-372
Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer....Pages 373-380
Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding....Pages 381-391
Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance....Pages 392-399
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware....Pages 341-348
Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme....Pages 349-356
Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition....Pages 357-364
A Generic Approach for Providing Revocation Support in Secret Handshake....Pages 276-284
An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy....Pages 285-292
Exploring Mobile Proxies for Better Password Authentication....Pages 293-302
On Security of Universal Hash Function Based Multiple Authentication....Pages 303-310
A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains....Pages 400-407
Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography....Pages 408-415
F 5 P 5 : Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances....Pages 416-426
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying’s Attack....Pages 311-320
Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack....Pages 321-330
Comparison between Side-Channel Analysis Distinguishers....Pages 331-340
Location Privacy Policy Management System....Pages 427-434
Privacy Protection in Social Networks Using l -Diversity....Pages 435-444
Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner....Pages 445-452
A Key Sharing Fuzzy Vault Scheme....Pages 453-460
A New Version of McEliece PKC Based on Convolutional Codes....Pages 461-470
Flexible Attribute-Based Encryption....Pages 471-478
Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles....Pages 479-487
A Comparative Study of Malware Family Classification....Pages 488-496
A Fine-Grained Classification Approach for the Packed Malicious Code....Pages 497-504
Back Matter....Pages -

✦ Subjects


Data Encryption; Data Structures, Cryptology and Information Theory; Coding and Information Theory; Systems and Data Security; Algorithm Analysis and Problem Complexity; Computer Communication Networks


πŸ“œ SIMILAR VOLUMES


Information Security: 17th International
✍ Sherman S. M. Chow, Jan Camenisch, Lucas C. K. Hui, Siu Ming Yiu (eds.) πŸ“‚ Library πŸ“… 2014 πŸ› Springer International Publishing 🌐 English

<p><p>This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. <br>The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected f

Information Theoretic Security: 10th Int
✍ Junji Shikata (eds.) πŸ“‚ Library πŸ“… 2017 πŸ› Springer International Publishing 🌐 English

<p>This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.<br/>The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the fo

Information and Communications Security:
✍ Lucas C. K. Hui, S. H. Qing, Elaine Shi, S. M. Yiu (eds.) πŸ“‚ Library πŸ“… 2015 πŸ› Springer International Publishing 🌐 English

<p>This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully select

Information and Communications Security:
✍ David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Ron πŸ“‚ Library πŸ“… 2018 πŸ› Springer International Publishing 🌐 English

<p>This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018.<p> The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers

Provable Security: 8th International Con
✍ Sherman S. M. Chow, Joseph K. Liu, Lucas C. K. Hui, Siu Ming Yiu (eds.) πŸ“‚ Library πŸ“… 2014 πŸ› Springer International Publishing 🌐 English

<p>This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions.

Network and System Security: 12th Intern
✍ Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kami πŸ“‚ Library πŸ“… 2018 πŸ› Springer International Publishing 🌐 English

<p><br>This book constitutes the proceedings of the 12th International Conference on Network and System Security, NSS 2018, held in Hong Kong, China, in August 2018. The 26 revised full papers and 9 short papers presented in this book were carefully reviewed and selected from 88 initial submissions.