Advertisement

Information and Communications Security

19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings

  • Sihan Qing
  • Chris Mitchell
  • Liqun Chen
  • Dongmei Liu
Conference proceedings ICICS 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10631)

Also part of the Security and Cryptology book sub series (LNSC, volume 10631)

Table of contents

  1. Privacy Protection

    1. Hai Liu, Zhenqiang Wu, Changgen Peng, Shuangyue Zhang, Feng Tian, Laifeng Lu
      Pages 446-458
    2. Zhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li
      Pages 459-471
    3. Jun Zhang, Linru Zhang, Meiqi He, Siu-Ming Yiu
      Pages 472-486
  2. Engineering Issues of Crypto

    1. Front Matter
      Pages 487-487
    2. Anirban Basu, Rui Xu, Juan Camilo Corena, Shinsaku Kiyomoto
      Pages 509-515
    3. Lei Xu, Chungen Xu, Joseph K. Liu, Cong Zuo, Peng Zhang
      Pages 516-528
    4. Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li
      Pages 529-540
    5. Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi
      Pages 541-553
  3. Cloud and E-commerce Security

    1. Front Matter
      Pages 555-555
    2. Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Chengyang Fan, Wei Hu et al.
      Pages 557-569
    3. Ruan He, Montida Pattaranantakul, Zonghua Zhang, Thomas Duval
      Pages 570-581
    4. Xiaoxuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu et al.
      Pages 582-592
  4. Security Protocols

    1. Front Matter
      Pages 593-593
    2. Gaurav Sharma, Rajeev Anand Sahu, Veronika Kuchta, Olivier Markowitch, Suman Bala
      Pages 606-618
  5. Network Security

    1. Front Matter
      Pages 619-619
    2. Jing Yang, Liming Wang, Zhen Xu
      Pages 633-645
    3. Wenjun Qian, Qingni Shen, Yizhe Yang, Yahui Yang, Zhonghai Wu
      Pages 661-673
    4. Zied Trifa, Jalel Eddine Hajlaoui, Maher Khemakhem
      Pages 674-686
  6. Back Matter
    Pages 687-689

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.

The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. 

Keywords

accesss control artificial intelligence authentication computer crime computer networks cryptography data mining data privacy data security electronic document identification systems encryption network security privacy preserving public key cryptography security security systems sensors software engineering telecommunication networks

Editors and affiliations

  • Sihan Qing
    • 1
  • Chris Mitchell
    • 2
  • Liqun Chen
    • 3
  • Dongmei Liu
    • 4
  1. 1.Chinese Academy of Sciences and Peking UniversityBeijingChina
  2. 2.Royal Holloway, University of LondonEghamUnited Kingdom
  3. 3.University of SurreyGuildfordUnited Kingdom
  4. 4.MicrosoftBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-89500-0
  • Copyright Information Springer International Publishing AG, part of Springer Nature 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-89499-7
  • Online ISBN 978-3-319-89500-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site