Advertisement

© 2016

Information and Communications Security

17th International Conference, ICICS 2015, Beijing, China, December 9–11, 2015, Revised Selected Papers

  • Sihan Qing
  • Eiji Okamoto
  • Kwangjo Kim
  • Dongmei Liu
Conference proceedings ICICS 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9543)

Also part of the Security and Cryptology book sub series (LNSC, volume 9543)

Table of contents

  1. Rajeev Anand Sahu, Vishal Saraswat
    Pages 252-259
  2. Jie Zhang, Aijun Ge, Siyu Xiao, Chuangui Ma
    Pages 260-268
  3. Hongwei Meng, Zhong Chen, Ziqian Meng, Chuck Song
    Pages 269-281
  4. Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Natalia Stakhanova
    Pages 282-294
  5. Degang Sun, Kun Yang, Weiqing Huang, Yan Wang, Bo Hu
    Pages 303-310
  6. Wenjun Fan, Zhihui Du, David Fernández, Xinning Hui
    Pages 311-319
  7. Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi
    Pages 320-334
  8. Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li
    Pages 335-345
  9. Yafei Ji, Luning Xia, Jingqiang Lin, Jian Zhou, Guozhu Zhang, Shijie Jia
    Pages 346-355
  10. Xue Zhang, Rui Zhang
    Pages 356-362
  11. Muhua Liu, Ying Wu, Jinyong Chang, Rui Xue, Wei Guo
    Pages 363-378
  12. Jiehui Tang, Yongbin Zhou, Hailong Zhang, Shuang Qiu
    Pages 379-392
  13. Nairen Cao, Xiaoqi Yu, Yufang Yang, Linru Zhang, SiuMing Yiu
    Pages 393-405
  14. Chuiyi Xie, Ying Huo, Sihan Qing, Shoushan Luo, Lingli Hu
    Pages 406-413
  15. Hongbo Fan, Shupeng Shi, Jing Zhang, Li Dong
    Pages 414-420
  16. Depeng Chen, Daojing He, Sammy Chan
    Pages 421-435
  17. Chuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu, Xiang Wan
    Pages 458-466

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015.

The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions. The papers provide the latest results in research and development in the field of information security and applied cryptology.

Keywords

big data security database security mobile security network security system security algorithms applied cryptography authentication cloud storage security cryptanalysis cryptographic protocols digital signature elliptic curve cryptography evaluation information security multimedia security privacy security applications virtualization security wireless network security

Editors and affiliations

  • Sihan Qing
    • 1
  • Eiji Okamoto
    • 2
  • Kwangjo Kim
    • 3
  • Dongmei Liu
    • 4
  1. 1.Institute of Information EngineeringChinese Academy of ScienceBeijingChina
  2. 2.Graduate School of Systems and Information EngineeringUniversity of TsukubaTsukubaJapan
  3. 3.School of ComputingKAISTDaejeonKorea (Republic of)
  4. 4.Westone CorporationBeijingChina

Bibliographic information