Skip to main content
  • Conference proceedings
  • © 2018

Information and Communications Security

20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11149)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2018.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (50 papers)

  1. Full Paper Session V: Privacy Protection

    1. PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction

      • Zhili Chen, Sheng Chen, Hong Zhong, Lin Chen, Miaomiao Tian
      Pages 248-267
  2. Full Paper Session VI: Signature Schemes

    1. Front Matter

      Pages 269-269
    2. Hierarchical Group Signatures with Verifier-Local Revocation

      • Lin Hou, Renzhang Liu, Tian Qiu, Dongdai Lin
      Pages 271-286
    3. Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation

      • Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
      Pages 287-302
    4. Towards Practical Lattice-Based One-Time Linkable Ring Signatures

      • Carsten Baum, Huang Lin, Sabine Oechsner
      Pages 303-322
  3. Full Paper Session VII: Attack Analysis and Detection

    1. Front Matter

      Pages 323-323
    2. Slop: Towards an Efficient and Universal Streaming Log Parser

      • Zhiyuan Zhao, Chenxu Wang, Wei Rao
      Pages 325-341
    3. Community Discovery of Attribution Trace Based on Deep Learning Approach

      • Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng
      Pages 342-357
    4. Examine Manipulated Datasets with Topology Data Analysis: A Case Study

      • Yun Guo, Daniel Sun, Guoqiang Li, Shiping Chen
      Pages 358-373
  4. Full Paper Session VIII: Searchable Encryption and Identity-Based Cryptography

    1. Front Matter

      Pages 375-375
    2. Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption

      • Yunong Liang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen
      Pages 377-392
    3. Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage

      • Cédric Van Rompay, Refik Molva, Melek Önen
      Pages 393-408
  5. Full Paper Session IX: Verifiable Storage and Computing

    1. Front Matter

      Pages 443-443
    2. Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage

      • Changsong Yang, Jianfeng Wang, Xiaoling Tao, Xiaofeng Chen
      Pages 445-458
    3. Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons

      • Henning Kopp, Frank Kargl, Christoph Bösch
      Pages 459-477
    4. Verifiable Single-Server Private Information Retrieval

      • Xingfeng Wang, Liang Zhao
      Pages 478-493
  6. Full Paper Session X: Applied Cryptography

    1. Front Matter

      Pages 495-495
    2. Cryptographic Password Obfuscation

      • Giovanni Di Crescenzo, Lisa Bahler, Brian Coan
      Pages 497-512

Other Volumes

  1. Information and Communications Security

About this book

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018.

The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

Editors and Affiliations

  • Départment d'Informatique, Ecole Normale Supérieure, Paris, France

    David Naccache

  • University of Texas, San Antonio, USA

    Shouhuai Xu

  • Chinese Academy of Sciences, Beijing, China

    Sihan Qing

  • Dipto di Informatica, Univ degli Studi di Milano, Crema, Italy

    Pierangela Samarati

  • Télécom SudParis, Evry, France

    Gregory Blanc

  • University of New Brunswick, Fredericton, Canada

    Rongxing Lu

  • IMT Lille Douai, Villeneuve-d'Ascq, France

    Zonghua Zhang, Ahmed Meddahi

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access