Information and Communications Security

18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9977)

Table of contents

  1. Front Matter
    Pages I-XII
  2. IoT Security

    1. Front Matter
      Pages 1-1
    2. Johannes Bauer, Ralf C. Staudemeyer, Henrich C. Pöhls, Alexandros Fragkiadakis
      Pages 3-17
    3. Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu, Limin Sun
      Pages 27-36
  3. Cloud Security

    1. Front Matter
      Pages 37-37
    2. Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, Meng Li
      Pages 39-53
    3. Wei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun
      Pages 54-70
    4. Lei Lei, Quanwei Cai, Bo Chen, Jingqiang Lin
      Pages 71-84
  4. Applied Cryptography

    1. Front Matter
      Pages 85-85
    2. Kewei Lv, Si-wei Ren, Wenjie Qin
      Pages 87-98
    3. Nan Yao, Yu Yu, Xiangxue Li, Dawu Gu
      Pages 99-106
    4. Wenwen Wang, Kewei Lv, Jianing Liu
      Pages 124-133
    5. Viktor Monarev, Ilja Duplischev, Andrey Pestunov
      Pages 134-144
    6. Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai
      Pages 145-156
  5. Attack Behavior Analytics

    1. Front Matter
      Pages 157-157
    2. Peizhi Shao, Jiuming Lu, Raymond K. Wong, Wenzhuo Yang
      Pages 159-172
    3. Thanh Nghia Ho, Wee Keong Ng
      Pages 173-183
    4. Chuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu
      Pages 184-194

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.
The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.

Keywords

embedded security network security privacy protections security services social engineering attacks cloud storage cryptography cybersecurity formal method hardware-based security protocols information hiding machine learning public-key encryption recommender system security analytics security requirements social aspects of security and privacy software and application security trust frameworks usability in security and privacy

Editors and affiliations

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-50011-9
  • Copyright Information Springer International Publishing AG 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-50010-2
  • Online ISBN 978-3-319-50011-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book