Information and Communications Security

15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings

  • Sihan Qing
  • Jianying Zhou
  • Dongmei Liu
Conference proceedings ICICS 2013

DOI: 10.1007/978-3-319-02726-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8233)

Table of contents (29 papers)

  1. Front Matter
  2. System Security

  3. Web Security and Worm Detection

    1. Rating Web Pages Using Page-Transition Evidence
      Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang
      Pages 49-58
    2. OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks
      Liang He, Dengguo Feng, Purui Su, Lingyun Ying, Yi Yang, Huafeng Huang et al.
      Pages 59-74
  4. Cloud Storage Security

    1. A Secure and Efficient Scheme for Cloud Storage against Eavesdropper
      Jian Liu, Huimei Wang, Ming Xian, Kun Huang
      Pages 75-89
    2. Secure and Private Outsourcing of Shape-Based Feature Extraction
      Shumiao Wang, Mohamed Nassar, Mikhail Atallah, Qutaibah Malluhi
      Pages 90-99
  5. Virtualization for Cloud Computing

    1. Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures
      Hong Rong, Ming Xian, Huimei Wang, Jiangyong Shi
      Pages 100-112
    2. Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks
      Smitha Sundareswaran, Anna C. Squcciarini
      Pages 113-124
    3. A Covert Channel Using Event Channel State on Xen Hypervisor
      Qingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang, Sihan Qing, Zhonghai Wu
      Pages 125-134
  6. Trusted and Trustworthy Computing

    1. Type-Based Analysis of Protected Storage in the TPM
      Jianxiong Shao, Dengguo Feng, Yu Qin
      Pages 135-150
    2. Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators
      Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
      Pages 151-166
  7. Authentication and Security Protocols

  8. Intrusion Detection and Recovery

    1. PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks
      Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis
      Pages 213-228
    2. Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels
      Jing Wang, Peng Liu, Limin Liu, Le Guan, Jiwu Jing
      Pages 229-244
  9. Side Channel Attacks and Defense

About these proceedings


This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications.


applied cryptography authentication information security network security privacy

Editors and affiliations

  • Sihan Qing
    • 1
  • Jianying Zhou
    • 2
  • Dongmei Liu
    • 1
  1. 1.Institute of SoftwareChinese Academy of SciencesBeijingChina
  2. 2.Institute for Infocomm Research, Infocom Security DepartmentSingaporeSingapore

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2013
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-02725-8
  • Online ISBN 978-3-319-02726-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349