Information and Communications Security

14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings

  • Tat Wing Chim
  • Tsz Hon Yuen
Conference proceedings ICICS 2012
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7618)

Table of contents

  1. Front Matter
  2. Full Papers

    1. Applied Cryptography

      1. Yang-Wai Chow, Willy Susilo, Duncan S. Wong
        Pages 10-21
      2. Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, Juanjo Alins
        Pages 22-32
    2. Cryptanalysis

      1. Hatem M. Bahig, Ashraf Bhery, Dieaa I. Nassr
        Pages 33-44
      2. Shusheng Liu, Zheng Gong, Libin Wang
        Pages 58-69
    3. Network Security

      1. Zouheir Trabelsi, Liren Zhang, Safaa Zeidan
        Pages 81-92
      2. John Felix, Charles Joseph, Ali A. Ghorbani
        Pages 93-104
    4. Optimization

      1. Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, Xingjie Yu
        Pages 105-118
    5. Privacy

      1. Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu Ming Yiu, Sihan Qing
        Pages 119-130
      2. Wilko Henecka, Nigel Bean, Matthew Roughan
        Pages 131-141
      3. Yang Wang, Man Ho Au, Willy Susilo
        Pages 142-153
      4. Xiaoqiong Pang, Bo Yang, Qiong Huang
        Pages 154-166
    6. Protocols

      1. Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou
        Pages 167-177
      2. Ning Ding, Dawu Gu
        Pages 178-190
      3. Jingwei Li, Chunfu Jia, Jin Li, Xiaofeng Chen
        Pages 191-201
      4. Atsushi Fujioka, Taiichi Saito, Keita Xagawa
        Pages 202-213
    7. Security in Mobile Systems

      1. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
        Pages 214-227

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012.
The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.

Keywords

combinatorial cryptosystem distributed denial-of-service attack network security polynomial interpolation vulnerability detection

Editors and affiliations

  • Tat Wing Chim
    • 1
  • Tsz Hon Yuen
    • 2
  1. 1.Department of Computer ScienceThe University of Hong KongHong Kong, China
  2. 2.Department of Computer ScienceThe University of Hong KongHong Kong, China

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-34129-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34128-1
  • Online ISBN 978-3-642-34129-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book