Information and Communications Security

18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings

  • Kwok-Yan Lam
  • Chi-Hung Chi
  • Sihan Qing

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9977)

Also part of the Security and Cryptology book sub series (LNSC, volume 9977)

Table of contents

  1. Front Matter
    Pages I-XII
  2. IoT Security

    1. Front Matter
      Pages 1-1
    2. Johannes Bauer, Ralf C. Staudemeyer, Henrich C. Pöhls, Alexandros Fragkiadakis
      Pages 3-17
    3. Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu, Limin Sun
      Pages 27-36
  3. Cloud Security

    1. Front Matter
      Pages 37-37
    2. Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, Meng Li
      Pages 39-53
    3. Wei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun
      Pages 54-70
    4. Lei Lei, Quanwei Cai, Bo Chen, Jingqiang Lin
      Pages 71-84
  4. Applied Cryptography

    1. Front Matter
      Pages 85-85
    2. Kewei Lv, Si-wei Ren, Wenjie Qin
      Pages 87-98
    3. Nan Yao, Yu Yu, Xiangxue Li, Dawu Gu
      Pages 99-106
    4. Wenwen Wang, Kewei Lv, Jianing Liu
      Pages 124-133
    5. Viktor Monarev, Ilja Duplischev, Andrey Pestunov
      Pages 134-144
    6. Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai
      Pages 145-156
  5. Attack Behavior Analytics

    1. Front Matter
      Pages 157-157
    2. Peizhi Shao, Jiuming Lu, Raymond K. Wong, Wenzhuo Yang
      Pages 159-172
    3. Thanh Nghia Ho, Wee Keong Ng
      Pages 173-183
    4. Chuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu
      Pages 184-194

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.
The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.

Keywords

embedded security network security privacy protections security services social engineering attacks cloud storage cryptography cybersecurity formal method hardware-based security protocols information hiding machine learning public-key encryption recommender system security analytics security requirements social aspects of security and privacy software and application security trust frameworks usability in security and privacy

Editors and affiliations

  • Kwok-Yan Lam
    • 1
  • Chi-Hung Chi
    • 2
  • Sihan Qing
    • 3
  1. 1.Nanyang Technological University SingaporeSingapore
  2. 2.CSIRO HobartAustralia
  3. 3.Peking University BeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-50011-9
  • Copyright Information Springer International Publishing AG 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-50010-2
  • Online ISBN 978-3-319-50011-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book