Advertisement

Frontiers in Cyber Security

First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings

  • Fagen Li
  • Tsuyoshi Takagi
  • Chunxiang Xu
  • Xiaosong Zhang
Conference proceedings FCS 2018

Part of the Communications in Computer and Information Science book series (CCIS, volume 879)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Invited Paper

    1. Front Matter
      Pages 1-1
    2. Sherman S. M. Chow
      Pages 3-6
  3. Symmetric Key Cryptography

  4. Public Key Cryptography

    1. Front Matter
      Pages 39-39
    2. Chunhua Jin, Guanhua Chen, Changhui Yu, Jianyang Zhao
      Pages 41-54
    3. Pengfei Liang, Leyou Zhang, Yujie Shang
      Pages 66-80
  5. Post-quantum Cryptography

    1. Front Matter
      Pages 81-81
    2. Yanhua Zhang, Yong Gan, Yifeng Yin, Huiwen Jia, Mingming Jiang
      Pages 83-95
    3. Zilong Wang, Honggang Hu
      Pages 96-109
    4. Jinqiu Hou, Mingming Jiang, Yuyan Guo, Wangan Song
      Pages 110-118
  6. Cloud Security and Data Deduplication

    1. Front Matter
      Pages 119-119
    2. Peng Zhang, Juntao Gao, Wenjuan Jia, Xuelian Li
      Pages 138-152
    3. Charles R. Haruna, Mengshu Hou, Moses J. Eghan, Michael Y. Kpiebaareh, Lawrence Tandoh
      Pages 153-167
    4. Hua Ma, Guohua Tian, Zhenhua Liu, Linchao Zhang
      Pages 168-176
  7. Access Control

    1. Front Matter
      Pages 177-177
    2. Yanyan Han, Guohao Li, Binbin Feng
      Pages 179-189
  8. Attack and Behavior Detection

    1. Front Matter
      Pages 199-199
    2. Juan Wang, Haoxi Zhang, Fei Li, Zuli Wang, Jun Zhao
      Pages 201-215
    3. Xiaofei Wang, Longcheng Yang, Jun Hu, Hao Dai
      Pages 216-224
  9. System and Network Security

    1. Front Matter
      Pages 225-225
    2. Danni Wang, Juntao Gao, Haiyong Yu, Xuelian Li
      Pages 227-240
    3. Lin Li, Mingyu Fan, Guangwei Wang
      Pages 241-255
    4. Yong Wang, Abdelrhman Hassan, Xiaoran Duan, Xiaodong Yang, Yiquan Zhang, Xiaosong Zhang
      Pages 256-270
  10. Security Design

    1. Front Matter
      Pages 271-271
    2. Rui Jin, Yidong Yuan, Ruishan Xin, Jie Gan, Xiaobo Hu, Yanyan Yu et al.
      Pages 273-281
  11. Back Matter
    Pages 299-300

About these proceedings

Introduction

This book constitutes the proceedings of the First International Conference on Frontiers in Cyber Security, held in Chengdu, China, in November 2018. 
The 18 full papers along with the3 short papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections, namely: symmetric key cryptography, public key cryptography, post-quantum cryptography, cloud security and data deduplication, access control, attack and behavior detection, system and network security, security design. 

Keywords

Computer Science Informatics Conference Proceedings Research Applications artificial intelligence authentication computer networks computer vision cryptography data security identity based cryptography identity-based public key cryptography Public keys (PK) random oracle model the standard model wireless telecommunication systems World Wide Web

Editors and affiliations

  1. 1.University of Electronic Science and Technology of ChinaChengduChina
  2. 2.University of TokyoTokyoJapan
  3. 3.University of Electronic Science and Technology of ChinaChengduChina
  4. 4.University of Electronic Science and Technology of ChinaChengduChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-981-13-3095-7
  • Copyright Information Springer Nature Singapore Pte Ltd. 2018
  • Publisher Name Springer, Singapore
  • eBook Packages Computer Science
  • Print ISBN 978-981-13-3094-0
  • Online ISBN 978-981-13-3095-7
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • Buy this book on publisher's site