© 2018

Information and Communications Security

20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings

  • David Naccache
  • Shouhuai Xu
  • Sihan Qing
  • Pierangela Samarati
  • Gregory Blanc
  • Rongxing Lu
  • Zonghua Zhang
  • Ahmed Meddahi
Conference proceedings ICICS 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11149)

Also part of the Security and Cryptology book sub series (LNSC, volume 11149)

Table of contents

  1. Front Matter
    Pages I-XV
  2. Full Paper Session I: Blockchain Technology

    1. Front Matter
      Pages 1-1
    2. Yuan Zhang, Xiaodong Lin, Chunxiang Xu
      Pages 3-19
    3. Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter
      Pages 20-38
  3. Full Paper Session II: Malware, Botnet and Network Security

    1. Front Matter
      Pages 39-39
    2. Jie Yin, Heyang Lv, Fangjiao Zhang, Zhihong Tian, Xiang Cui
      Pages 57-74
    3. Dan Tang, Rui Dai, Liu Tang, Sijia Zhan, Jianping Man
      Pages 92-104
  4. Full Paper Session III: Real-World Cryptography

    1. Front Matter
      Pages 105-105
    2. Chenyu Wang, Tao Huang, Hongjun Wu
      Pages 107-123
    3. Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong
      Pages 142-157
  5. Full Paper Session IV: Encrypted Computing

    1. Front Matter
      Pages 159-159
    2. Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi
      Pages 177-191
    3. Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu
      Pages 192-211
  6. Full Paper Session V: Privacy Protection

    1. Front Matter
      Pages 213-213
    2. Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens
      Pages 232-247

About these proceedings


This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018.

The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.


artificial intelligence authentication cloud computing computer crime computer networks computer systems cryptography data privacy data security electronic document identification systems encryption internet network security privacy public key cryptography Public keys (PK) security systems software engineering structural design wireless telecommunication systems

Editors and affiliations

  1. 1.Départment d'InformatiqueEcole Normale SupérieureParisFrance
  2. 2.University of TexasSan AntonioUSA
  3. 3.Chinese Academy of SciencesBeijingChina
  4. 4.Dipto di InformaticaUniv degli Studi di MilanoCremaItaly
  5. 5.Télécom SudParisEvryFrance
  6. 6.University of New BrunswickFrederictonCanada
  7. 7.IMT Lille DouaiVilleneuve-d'AscqFrance
  8. 8.IMT Lille DouaiVilleneuve-d'AscqFrance

Bibliographic information