Information and Communications Security : 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings / edited by Tat Wing Chim, Tsz Hon Yuen.

By: (14th : ICICS (Conference) (14th : 2012 : Hong Kong, China)
Contributor(s): Chim, Tat Wing | Yuen, Tsz Hon
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 7618.Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint : Springer, 2012Description: 1 online resource (XVI, 506 pages 120 illustrations)Content type: text Media type: computer Carrier type: online resourceISBN: 9783642341298; 3642341292Subject(s): Computer science | Computer networks -- Congresses | Data protection | Data structures (Computer science) | Data encryption (Computer science) | Coding theory | Computer software | Informatique | Coding theory | Computer networks | Computer science | Computer software | Data encryption (Computer science) | Data protection | Data structures (Computer science) | computerwetenschappen | computer sciences | informatietheorie | information theory | algoritmen | algorithms | computeranalyse | computer analysis | gegevensstructuren | data structures | gegevensbeheer | data management | computernetwerken | computer networks | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. Additional physical formats: Print version:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
Applied cryptography: Audio Steganalysis Based on Lossless Data-Compression Techniques / Fatiha Djebbar and Beghdad Ayad -- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme / Yang-Wai Chow, Willy Susilo, and Duncan S. Wong -- Impact of the Revocation Service in PKI Prices / Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, and Juanjo Alins -- Cryptanalysis: Cryptanalysis of Multi-Prime RSA with Small Prime Difference / Hatem M. Bahig, Ashraf Bhery, and Dieaa I. Nassr -- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem / Jun Xu, Lei Hu, Siwei Sun -- Improved Related-Key Differential Attacks on Reduced-Round LBlock / Shusheng Liu, Zheng Gong, and Libin Wang -- Network Security: Countermeasures on Application Level Low-Rate Denial-of-Service Attack / Yajuan Tang -- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test / Zouheir Trabelsi, Liren Zhang, and Safaa Zeidan.
Group Behavior Metrics for P2P Botnet Detection / John Felix, Charles Joseph, and Ali A. Ghorbani -- Optimization: Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA / Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, and Xingjie Yu -- Privacy: Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model / Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu Ming Yiu, and Sihan Qing -- Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain / Wilko Henecka, Nigel Bean, and Matthew Roughan -- Perfect Ambiguous Optimistic Fair Exchange / Yang Wang, Man Ho Au, and Willy Susilo -- Privacy-Preserving Noisy Keyword Search in Cloud Computing / Xiaoqiong Pang, Bo Yang, and Qiong Huang -- Protocols: Forward Secure Attribute-Based Signatures / Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, and Jianhing Zhou -- On Constant-Round Precise Zero-Knowledge / Ning Ding and Dawu Gu.
Outsourcing Encryption of Attribute-Based Encryption with MapReduce / Jingwei Li, Chunfu Jia, Jin Li, and Xiaofeng Chen -- Security Enhancement of Identity-Based Identification with Reversibility / Atsushi Fujioka, Taiichi Saito, and Keita Xagawa -- Security in mobile systems: Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture / Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes -- Permission-Based Abnormal Application Detection for Android / Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, and Zhong Chen -- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data / Vrizlynn L.L. Thing and Darell J.J. Tan -- Software security: Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis / Ruoru Zhao, Dawu Gu, Juanru Li, and Hui Liu -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine / Ricardo Corin and Felipe Andrés Manzano.
A Generic Approach for Providing Revocation Support in Secret Handshake / Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, and Jianying Zhou -- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy / Anjia Yang, Yunhui Zhuang, and Duncan S. Wong -- Exploring Mobile Proxies for Better Password Authentication / Nitesh Saxena and Jonathan Voris -- On Security of Universal Hash Function Based Multiple Authentication / Aysajan Abidin -- A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack / Zhenqi Li, Yao Lu, Wenhao Wang, Bin Zhang, and Dongdai Lin -- Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack / Zhenqi Li, Bin Zhang, Yao Lu, Jing Zou, and Dongdai Lin -- Comparison between Side-Channel Analysis Distinguishers / Houssem Maghrebi, Olivier Rioul, Sylvain Guilley, and Jean-Luc Danger -- Multimedia security and GPU-enabled computation: Acceleration of Composite Order Bilinear Pairing on Graphics Hardware / Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, and Siu Ming Yiu.
Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme / Yuxin Meng and Wenjuan Li -- Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition / Liu Yong, Huang Meishan, and Lin Bogang -- Network security: Cookie-Proxy: A Scheme to Prevent SSLStrip Attack / Sendong Zhao, Ding Wang, Sicheng Zhao, Wu Yang, and Chunguang Ma -- Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer / Ting Dai, Sai Sathyanarayan, Roland H.C. Yap, and Zhenkai Liang-- Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding / Daewon Kim, Byoungkoo Kim, Ikkyun Kim, Jeongnyeo Kim, and Hyunsook Cho -- Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance / Yan Cao, Qiang Wei, and Qingxian Wang -- Privacy: A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains / Wei Xin, Byoungkoo Kim, Ikkyun Kim, Jeongnyeo Kim, and Hyunsook Cho -- Efficient Attribute Proofs in Anonymous Credential Using Attribute-Based Cryptography / Yan Zhang and Dengguo Feng.
F⁵P⁵: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances / Huimin Shuai and Wen Tao Zhu -- Location Privacy Policy Management System /Arej Muhammed, Dan Lin, and Anna Squicciarini -- Privacy Protection in Social Networks Using l-Diversity / Liangwen Yu, Jiawei Zhu, Zhengang Wu, Tao Yang, Jianbin Hu, and Zhong Chen -- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner / Tat Wing Chim, Siu Ming Yiu, Lucas Chi Kwong Hui, Victor On Kwok Li, Tin Wing Mui, Yu Hin Tsang, Chun Kin Kwok, and Kwun Yin Yu -- Protocols: A Key Sharing Fuzzy Vault Scheme / Lin You, Mengsheng Fan, Jie Lu, Shengguo Wang, and Fenghai Li -- A New Version of McEliece PKC Based on Convolutional Codes / Carl Löndahl and Thomas Johansson -- Flexible Attribute-Based Encryption / Seiko Arita -- Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles / Yanli Ren, Shuozhong Wang, and Xinpeng Zhang -- A Comparative Study of Malware Family Classification / Rafiqul Islam and Irfan Atlas -- A Fine-Grained Classification Approach for the Packed Malicious Code / Shanquing Guo, Shuangshuang Li, Yan Yu, Anlei Hu, and Tao Ban.
Summary: This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Applied cryptography: Audio Steganalysis Based on Lossless Data-Compression Techniques / Fatiha Djebbar and Beghdad Ayad -- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme / Yang-Wai Chow, Willy Susilo, and Duncan S. Wong -- Impact of the Revocation Service in PKI Prices / Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, and Juanjo Alins -- Cryptanalysis: Cryptanalysis of Multi-Prime RSA with Small Prime Difference / Hatem M. Bahig, Ashraf Bhery, and Dieaa I. Nassr -- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem / Jun Xu, Lei Hu, Siwei Sun -- Improved Related-Key Differential Attacks on Reduced-Round LBlock / Shusheng Liu, Zheng Gong, and Libin Wang -- Network Security: Countermeasures on Application Level Low-Rate Denial-of-Service Attack / Yajuan Tang -- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test / Zouheir Trabelsi, Liren Zhang, and Safaa Zeidan.

Group Behavior Metrics for P2P Botnet Detection / John Felix, Charles Joseph, and Ali A. Ghorbani -- Optimization: Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA / Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, and Xingjie Yu -- Privacy: Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model / Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu Ming Yiu, and Sihan Qing -- Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain / Wilko Henecka, Nigel Bean, and Matthew Roughan -- Perfect Ambiguous Optimistic Fair Exchange / Yang Wang, Man Ho Au, and Willy Susilo -- Privacy-Preserving Noisy Keyword Search in Cloud Computing / Xiaoqiong Pang, Bo Yang, and Qiong Huang -- Protocols: Forward Secure Attribute-Based Signatures / Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, and Jianhing Zhou -- On Constant-Round Precise Zero-Knowledge / Ning Ding and Dawu Gu.

Outsourcing Encryption of Attribute-Based Encryption with MapReduce / Jingwei Li, Chunfu Jia, Jin Li, and Xiaofeng Chen -- Security Enhancement of Identity-Based Identification with Reversibility / Atsushi Fujioka, Taiichi Saito, and Keita Xagawa -- Security in mobile systems: Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture / Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes -- Permission-Based Abnormal Application Detection for Android / Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, and Zhong Chen -- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data / Vrizlynn L.L. Thing and Darell J.J. Tan -- Software security: Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis / Ruoru Zhao, Dawu Gu, Juanru Li, and Hui Liu -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine / Ricardo Corin and Felipe Andrés Manzano.

A Generic Approach for Providing Revocation Support in Secret Handshake / Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, and Jianying Zhou -- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy / Anjia Yang, Yunhui Zhuang, and Duncan S. Wong -- Exploring Mobile Proxies for Better Password Authentication / Nitesh Saxena and Jonathan Voris -- On Security of Universal Hash Function Based Multiple Authentication / Aysajan Abidin -- A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack / Zhenqi Li, Yao Lu, Wenhao Wang, Bin Zhang, and Dongdai Lin -- Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack / Zhenqi Li, Bin Zhang, Yao Lu, Jing Zou, and Dongdai Lin -- Comparison between Side-Channel Analysis Distinguishers / Houssem Maghrebi, Olivier Rioul, Sylvain Guilley, and Jean-Luc Danger -- Multimedia security and GPU-enabled computation: Acceleration of Composite Order Bilinear Pairing on Graphics Hardware / Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, and Siu Ming Yiu.

Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme / Yuxin Meng and Wenjuan Li -- Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition / Liu Yong, Huang Meishan, and Lin Bogang -- Network security: Cookie-Proxy: A Scheme to Prevent SSLStrip Attack / Sendong Zhao, Ding Wang, Sicheng Zhao, Wu Yang, and Chunguang Ma -- Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer / Ting Dai, Sai Sathyanarayan, Roland H.C. Yap, and Zhenkai Liang-- Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding / Daewon Kim, Byoungkoo Kim, Ikkyun Kim, Jeongnyeo Kim, and Hyunsook Cho -- Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance / Yan Cao, Qiang Wei, and Qingxian Wang -- Privacy: A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains / Wei Xin, Byoungkoo Kim, Ikkyun Kim, Jeongnyeo Kim, and Hyunsook Cho -- Efficient Attribute Proofs in Anonymous Credential Using Attribute-Based Cryptography / Yan Zhang and Dengguo Feng.

F⁵P⁵: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances / Huimin Shuai and Wen Tao Zhu -- Location Privacy Policy Management System /Arej Muhammed, Dan Lin, and Anna Squicciarini -- Privacy Protection in Social Networks Using l-Diversity / Liangwen Yu, Jiawei Zhu, Zhengang Wu, Tao Yang, Jianbin Hu, and Zhong Chen -- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner / Tat Wing Chim, Siu Ming Yiu, Lucas Chi Kwong Hui, Victor On Kwok Li, Tin Wing Mui, Yu Hin Tsang, Chun Kin Kwok, and Kwun Yin Yu -- Protocols: A Key Sharing Fuzzy Vault Scheme / Lin You, Mengsheng Fan, Jie Lu, Shengguo Wang, and Fenghai Li -- A New Version of McEliece PKC Based on Convolutional Codes / Carl Löndahl and Thomas Johansson -- Flexible Attribute-Based Encryption / Seiko Arita -- Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles / Yanli Ren, Shuozhong Wang, and Xinpeng Zhang -- A Comparative Study of Malware Family Classification / Rafiqul Islam and Irfan Atlas -- A Fine-Grained Classification Approach for the Packed Malicious Code / Shanquing Guo, Shuangshuang Li, Yan Yu, Anlei Hu, and Tao Ban.

This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.

Includes bibliographical references and author index.

There are no comments for this item.

to post a comment.

Powered by Koha