© 2015

Information and Communications Security

16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers

  • Lucas C. K. Hui
  • S. H. Qing
  • Elaine Shi
  • S. M. Yiu
Conference proceedings ICICS 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8958)

Also part of the Security and Cryptology book sub series (LNSC, volume 8958)

Table of contents

  1. Front Matter
    Pages I-X
  2. Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao
    Pages 1-15
  3. Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang
    Pages 16-30
  4. Qianying Zhang, Shijun Zhao, Li Xi, Wei Feng, Dengguo Feng
    Pages 31-48
  5. Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen
    Pages 49-60
  6. Hong Zhang, Xiaolei Dong, Zhenfu Cao, Jiachen Shen
    Pages 61-73
  7. Ahmad Ahmadi, Reihaneh Safavi-Naini
    Pages 74-88
  8. Xifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi
    Pages 89-104
  9. Hui Liu, Yuanyuan Zhang, Hui Wang, Wenbo Yang, Juanru Li, Dawu Gu
    Pages 120-131
  10. Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu
    Pages 132-142
  11. Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim
    Pages 158-175
  12. Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada
    Pages 176-190
  13. Yingxian Zheng, Yongbin Zhou, Zhenmei Yu, Chengyu Hu, Hailong Zhang
    Pages 200-214
  14. Y. Sreenivasa Rao, Ratna Dutta
    Pages 215-229
  15. Yang-Wai Chow, Willy Susilo, Man Ho Au, Ari Moesriami Barmawi
    Pages 243-257
  16. Rajeev Anand Sahu, Vishal Saraswat
    Pages 258-273

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applications in the field of information security and cryptology.


Access control Applied cryptography Authentication Cryptography Digital signature Dual encryption system E-coin Elliptic curve cryptography Information security Network security Oblivious transfer One-time password Privacy protection Provably secure Secure applications Secure protocols Secure systems Security Security proofs Side-channel analysis

Editors and affiliations

  • Lucas C. K. Hui
    • 1
  • S. H. Qing
    • 2
  • Elaine Shi
    • 3
  • S. M. Yiu
    • 4
  1. 1.The University of Hong KongHong KongChina
  2. 2.Peking UniversityBeijingChina
  3. 3.University of MarylandCollege ParkUSA
  4. 4.The University of Hong KongHong KongChina

Bibliographic information