Skip to main content
  • Conference proceedings
  • © 2016

Information and Communications Security

18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9977)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2016.

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-50011-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 84.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (36 papers)

  1. Front Matter

    Pages I-XII
  2. IoT Security

    1. Front Matter

      Pages 1-1
    2. ECDSA on Things: IoT Integrity Protection in Practise

      • Johannes Bauer, Ralf C. Staudemeyer, Henrich C. Pöhls, Alexandros Fragkiadakis
      Pages 3-17
    3. A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems

      • Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu, Limin Sun
      Pages 27-36
  3. Cloud Security

    1. Front Matter

      Pages 37-37
    2. A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks

      • Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, Meng Li
      Pages 39-53
    3. Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System

      • Wei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun
      Pages 54-70
    4. Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds

      • Lei Lei, Quanwei Cai, Bo Chen, Jingqiang Lin
      Pages 71-84
  4. Applied Cryptography

    1. Front Matter

      Pages 85-85
    2. The Security of Individual Bit for XTR

      • Kewei Lv, Si-wei Ren, Wenjie Qin
      Pages 87-98
    3. On the Robustness of Learning Parity with Noise

      • Nan Yao, Yu Yu, Xiangxue Li, Dawu Gu
      Pages 99-106
    4. The Variant of Remote Set Problem on Lattices

      • Wenwen Wang, Kewei Lv, Jianing Liu
      Pages 124-133
    5. Compression-Based Integral Prior Classification for Improving Steganalysis

      • Viktor Monarev, Ilja Duplischev, Andrey Pestunov
      Pages 134-144
    6. Group Verification Based Multiple-Differential Collision Attack

      • Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai
      Pages 145-156
  5. Attack Behavior Analytics

    1. Front Matter

      Pages 157-157
    2. A Transparent Learning Approach for Attack Prediction Based on User Behavior Analysis

      • Peizhi Shao, Jiuming Lu, Raymond K. Wong, Wenzhuo Yang
      Pages 159-172
    3. Application of Stylometry to DarkWeb Forum User Identification

      • Thanh Nghia Ho, Wee Keong Ng
      Pages 173-183
    4. SECapacity: A Secure Capacity Scheduler in YARN

      • Chuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu
      Pages 184-194

Other Volumes

  1. Information and Communications Security

About this book

This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.
The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.

Keywords

  • embedded security
  • network security
  • privacy protections
  • security services
  • social engineering attacks
  • cloud storage
  • cryptography
  • cybersecurity
  • formal method
  • hardware-based security protocols
  • information hiding
  • machine learning
  • public-key encryption
  • recommender system
  • security analytics
  • security requirements
  • social aspects of security and privacy
  • software and application security
  • trust frameworks
  • usability in security and privacy
  • data structures

Editors and Affiliations

  • Nanyang Technological University , Singapore, Singapore

    Kwok-Yan Lam

  • CSIRO , Hobart, Australia

    Chi-Hung Chi

  • Peking University , Beijing, China

    Sihan Qing

Bibliographic Information

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-50011-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 84.99
Price excludes VAT (USA)