Information and Communications Security : 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings /
Saved in:
Meeting name: | ICICS (Conference) (14th : 2012 : Hong Kong, China) |
---|---|
Imprint: | Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint : Springer, 2012. |
Description: | 1 online resource (XVI, 506 pages 120 illustrations). |
Language: | English |
Series: | Lecture Notes in Computer Science, 0302-9743 ; 7618 Lecture notes in computer science ; 7618. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11077649 |
Table of Contents:
- Applied cryptography: Audio Steganalysis Based on Lossless Data-Compression Techniques / Fatiha Djebbar and Beghdad Ayad
- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme / Yang-Wai Chow, Willy Susilo, and Duncan S. Wong
- Impact of the Revocation Service in PKI Prices / Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, and Juanjo Alins
- Cryptanalysis: Cryptanalysis of Multi-Prime RSA with Small Prime Difference / Hatem M. Bahig, Ashraf Bhery, and Dieaa I. Nassr
- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem / Jun Xu, Lei Hu, Siwei Sun
- Improved Related-Key Differential Attacks on Reduced-Round LBlock / Shusheng Liu, Zheng Gong, and Libin Wang
- Network Security: Countermeasures on Application Level Low-Rate Denial-of-Service Attack / Yajuan Tang
- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test / Zouheir Trabelsi, Liren Zhang, and Safaa Zeidan.
- Group Behavior Metrics for P2P Botnet Detection / John Felix, Charles Joseph, and Ali A. Ghorbani
- Optimization: Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA / Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, and Xingjie Yu
- Privacy: Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model / Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu Ming Yiu, and Sihan Qing
- Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain / Wilko Henecka, Nigel Bean, and Matthew Roughan
- Perfect Ambiguous Optimistic Fair Exchange / Yang Wang, Man Ho Au, and Willy Susilo
- Privacy-Preserving Noisy Keyword Search in Cloud Computing / Xiaoqiong Pang, Bo Yang, and Qiong Huang
- Protocols: Forward Secure Attribute-Based Signatures / Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, and Jianhing Zhou
- On Constant-Round Precise Zero-Knowledge / Ning Ding and Dawu Gu.
- Outsourcing Encryption of Attribute-Based Encryption with MapReduce / Jingwei Li, Chunfu Jia, Jin Li, and Xiaofeng Chen
- Security Enhancement of Identity-Based Identification with Reversibility / Atsushi Fujioka, Taiichi Saito, and Keita Xagawa
- Security in mobile systems: Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture / Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
- Permission-Based Abnormal Application Detection for Android / Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, and Zhong Chen
- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data / Vrizlynn L.L. Thing and Darell J.J. Tan
- Software security: Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis / Ruoru Zhao, Dawu Gu, Juanru Li, and Hui Liu
- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine / Ricardo Corin and Felipe Andrés Manzano.
- A Generic Approach for Providing Revocation Support in Secret Handshake / Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, and Jianying Zhou
- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy / Anjia Yang, Yunhui Zhuang, and Duncan S. Wong
- Exploring Mobile Proxies for Better Password Authentication / Nitesh Saxena and Jonathan Voris
- On Security of Universal Hash Function Based Multiple Authentication / Aysajan Abidin
- A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack / Zhenqi Li, Yao Lu, Wenhao Wang, Bin Zhang, and Dongdai Lin
- Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack / Zhenqi Li, Bin Zhang, Yao Lu, Jing Zou, and Dongdai Lin
- Comparison between Side-Channel Analysis Distinguishers / Houssem Maghrebi, Olivier Rioul, Sylvain Guilley, and Jean-Luc Danger
- Multimedia security and GPU-enabled computation: Acceleration of Composite Order Bilinear Pairing on Graphics Hardware / Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, and Siu Ming Yiu.
- Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme / Yuxin Meng and Wenjuan Li
- Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition / Liu Yong, Huang Meishan, and Lin Bogang
- Network security: Cookie-Proxy: A Scheme to Prevent SSLStrip Attack / Sendong Zhao, Ding Wang, Sicheng Zhao, Wu Yang, and Chunguang Ma
- Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer / Ting Dai, Sai Sathyanarayan, Roland H.C. Yap, and Zhenkai Liang-- Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding / Daewon Kim, Byoungkoo Kim, Ikkyun Kim, Jeongnyeo Kim, and Hyunsook Cho
- Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance / Yan Cao, Qiang Wei, and Qingxian Wang
- Privacy: A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains / Wei Xin, Byoungkoo Kim, Ikkyun Kim, Jeongnyeo Kim, and Hyunsook Cho
- Efficient Attribute Proofs in Anonymous Credential Using Attribute-Based Cryptography / Yan Zhang and Dengguo Feng.
- F⁵P⁵: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances / Huimin Shuai and Wen Tao Zhu
- Location Privacy Policy Management System /Arej Muhammed, Dan Lin, and Anna Squicciarini
- Privacy Protection in Social Networks Using l-Diversity / Liangwen Yu, Jiawei Zhu, Zhengang Wu, Tao Yang, Jianbin Hu, and Zhong Chen
- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner / Tat Wing Chim, Siu Ming Yiu, Lucas Chi Kwong Hui, Victor On Kwok Li, Tin Wing Mui, Yu Hin Tsang, Chun Kin Kwok, and Kwun Yin Yu
- Protocols: A Key Sharing Fuzzy Vault Scheme / Lin You, Mengsheng Fan, Jie Lu, Shengguo Wang, and Fenghai Li
- A New Version of McEliece PKC Based on Convolutional Codes / Carl Löndahl and Thomas Johansson
- Flexible Attribute-Based Encryption / Seiko Arita
- Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles / Yanli Ren, Shuozhong Wang, and Xinpeng Zhang
- A Comparative Study of Malware Family Classification / Rafiqul Islam and Irfan Atlas
- A Fine-Grained Classification Approach for the Packed Malicious Code / Shanquing Guo, Shuangshuang Li, Yan Yu, Anlei Hu, and Tao Ban.