Advertisement

Information and Communications Security

20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings

  • David Naccache
  • Shouhuai Xu
  • Sihan Qing
  • Pierangela Samarati
  • Gregory Blanc
  • Rongxing Lu
  • Zonghua Zhang
  • Ahmed Meddahi
Conference proceedings ICICS 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11149)

Also part of the Security and Cryptology book sub series (LNSC, volume 11149)

Table of contents

  1. Front Matter
    Pages I-XV
  2. Full Paper Session I: Blockchain Technology

    1. Front Matter
      Pages 1-1
    2. Yuan Zhang, Xiaodong Lin, Chunxiang Xu
      Pages 3-19
    3. Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter
      Pages 20-38
  3. Full Paper Session II: Malware, Botnet and Network Security

    1. Front Matter
      Pages 39-39
    2. Jie Yin, Heyang Lv, Fangjiao Zhang, Zhihong Tian, Xiang Cui
      Pages 57-74
    3. Dan Tang, Rui Dai, Liu Tang, Sijia Zhan, Jianping Man
      Pages 92-104
  4. Full Paper Session III: Real-World Cryptography

    1. Front Matter
      Pages 105-105
    2. Chenyu Wang, Tao Huang, Hongjun Wu
      Pages 107-123
    3. Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong
      Pages 142-157
  5. Full Paper Session IV: Encrypted Computing

    1. Front Matter
      Pages 159-159
    2. Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi
      Pages 177-191
    3. Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu
      Pages 192-211
  6. Full Paper Session V: Privacy Protection

    1. Front Matter
      Pages 213-213
    2. Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens
      Pages 232-247
    3. Zhili Chen, Sheng Chen, Hong Zhong, Lin Chen, Miaomiao Tian
      Pages 248-267
  7. Full Paper Session VI: Signature Schemes

    1. Front Matter
      Pages 269-269
    2. Lin Hou, Renzhang Liu, Tian Qiu, Dongdai Lin
      Pages 271-286
    3. Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
      Pages 287-302
    4. Carsten Baum, Huang Lin, Sabine Oechsner
      Pages 303-322
  8. Full Paper Session VII: Attack Analysis and Detection

    1. Front Matter
      Pages 323-323
    2. Zhiyuan Zhao, Chenxu Wang, Wei Rao
      Pages 325-341
    3. Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng
      Pages 342-357
    4. Yun Guo, Daniel Sun, Guoqiang Li, Shiping Chen
      Pages 358-373
  9. Full Paper Session VIII: Searchable Encryption and Identity-Based Cryptography

  10. Full Paper Session IX: Verifiable Storage and Computing

    1. Front Matter
      Pages 443-443
    2. Changsong Yang, Jianfeng Wang, Xiaoling Tao, Xiaofeng Chen
      Pages 445-458
    3. Henning Kopp, Frank Kargl, Christoph Bösch
      Pages 459-477
    4. Xingfeng Wang, Liang Zhao
      Pages 478-493
  11. Full Paper Session X: Applied Cryptography

    1. Front Matter
      Pages 495-495
    2. Giovanni Di Crescenzo, Lisa Bahler, Brian Coan
      Pages 497-512
    3. Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan
      Pages 513-529
  12. Full Paper Session XI: Supporting Techniques

    1. Front Matter
      Pages 549-549
    2. Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu
      Pages 584-597
    3. Yao Lu, Noboru Kunihiro, Rui Zhang, Liqiang Peng, Hui Ma
      Pages 598-608
  13. Full Paper Session XII: Formal Analysis and Cryptanalysis

    1. Front Matter
      Pages 609-609
    2. Florian Kammüller
      Pages 611-628
    3. Fan Zhang, Cong Zhang, Mingdi Xu, Xiaoli Liu, Fangning Hu, HanChieh Chao
      Pages 629-646

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018.

The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

Keywords

artificial intelligence authentication cloud computing computer crime computer networks computer systems cryptography data privacy data security electronic document identification systems encryption internet network security privacy public key cryptography Public keys (PK) security systems software engineering structural design wireless telecommunication systems

Editors and affiliations

  1. 1.Départment d'InformatiqueEcole Normale SupérieureParisFrance
  2. 2.University of TexasSan AntonioUSA
  3. 3.Chinese Academy of SciencesBeijingChina
  4. 4.Dipto di InformaticaUniv degli Studi di MilanoCremaItaly
  5. 5.Télécom SudParisEvryFrance
  6. 6.University of New BrunswickFrederictonCanada
  7. 7.IMT Lille DouaiVilleneuve-d'AscqFrance
  8. 8.IMT Lille DouaiVilleneuve-d'AscqFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-01950-1
  • Copyright Information Springer Nature Switzerland AG 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-01949-5
  • Online ISBN 978-3-030-01950-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site