© 2016

Information and Communications Security

17th International Conference, ICICS 2015, Beijing, China, December 9–11, 2015, Revised Selected Papers

  • Sihan Qing
  • Eiji Okamoto
  • Kwangjo Kim
  • Dongmei Liu
Conference proceedings ICICS 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9543)

Also part of the Security and Cryptology book sub series (LNSC, volume 9543)

Table of contents

  1. Shangqi Lai, Joseph K. Liu, Kim-Kwang Raymond Choo, Kaitai Liang
    Pages 467-477
  2. Rong Wang, Min Zhang, Dengguo Feng, Yanyan Fu, Zhenyu Chen
    Pages 478-484
  3. Back Matter
    Pages 485-486

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015.

The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions. The papers provide the latest results in research and development in the field of information security and applied cryptology.


big data security database security mobile security network security system security algorithms applied cryptography authentication cloud storage security cryptanalysis cryptographic protocols digital signature elliptic curve cryptography evaluation information security multimedia security privacy security applications virtualization security wireless network security

Editors and affiliations

  • Sihan Qing
    • 1
  • Eiji Okamoto
    • 2
  • Kwangjo Kim
    • 3
  • Dongmei Liu
    • 4
  1. 1.Institute of Information EngineeringChinese Academy of ScienceBeijingChina
  2. 2.Graduate School of Systems and Information EngineeringUniversity of TsukubaTsukubaJapan
  3. 3.School of ComputingKAISTDaejeonKorea (Republic of)
  4. 4.Westone CorporationBeijingChina

Bibliographic information