Information and Communications Security

15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings

  • Sihan Qing
  • Jianying Zhou
  • Dongmei Liu
Conference proceedings ICICS 2013
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8233)

Table of contents

  1. Front Matter
  2. System Security

  3. Web Security and Worm Detection

    1. Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang
      Pages 49-58
    2. Liang He, Dengguo Feng, Purui Su, Lingyun Ying, Yi Yang, Huafeng Huang et al.
      Pages 59-74
  4. Cloud Storage Security

    1. Jian Liu, Huimei Wang, Ming Xian, Kun Huang
      Pages 75-89
    2. Shumiao Wang, Mohamed Nassar, Mikhail Atallah, Qutaibah Malluhi
      Pages 90-99
  5. Virtualization for Cloud Computing

    1. Hong Rong, Ming Xian, Huimei Wang, Jiangyong Shi
      Pages 100-112
    2. Smitha Sundareswaran, Anna C. Squcciarini
      Pages 113-124
    3. Qingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang, Sihan Qing, Zhonghai Wu
      Pages 125-134
  6. Trusted and Trustworthy Computing

    1. Jianxiong Shao, Dengguo Feng, Yu Qin
      Pages 135-150
    2. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
      Pages 151-166
  7. Authentication and Security Protocols

  8. Intrusion Detection and Recovery

    1. Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis
      Pages 213-228
    2. Jing Wang, Peng Liu, Limin Liu, Le Guan, Jiwu Jing
      Pages 229-244
  9. Side Channel Attacks and Defense

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications.

Keywords

applied cryptography authentication information security network security privacy

Editors and affiliations

  • Sihan Qing
    • 1
  • Jianying Zhou
    • 2
  • Dongmei Liu
    • 1
  1. 1.Institute of SoftwareChinese Academy of SciencesBeijingChina
  2. 2.Institute for Infocomm Research, Infocom Security DepartmentSingaporeSingapore

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-02726-5
  • Copyright Information Springer International Publishing Switzerland 2013
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-02725-8
  • Online ISBN 978-3-319-02726-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book