Advertisement

Information and Communications Security

14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings

  • Tat Wing Chim
  • Tsz Hon Yuen
Conference proceedings ICICS 2012

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7618)

Table of contents

  1. Front Matter
  2. Full Papers

    1. Applied Cryptography

      1. Yang-Wai Chow, Willy Susilo, Duncan S. Wong
        Pages 10-21
      2. Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, Juanjo Alins
        Pages 22-32
    2. Cryptanalysis

      1. Hatem M. Bahig, Ashraf Bhery, Dieaa I. Nassr
        Pages 33-44
      2. Shusheng Liu, Zheng Gong, Libin Wang
        Pages 58-69
    3. Network Security

      1. Zouheir Trabelsi, Liren Zhang, Safaa Zeidan
        Pages 81-92
      2. John Felix, Charles Joseph, Ali A. Ghorbani
        Pages 93-104
    4. Optimization

      1. Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, Xingjie Yu
        Pages 105-118
    5. Privacy

      1. Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu Ming Yiu, Sihan Qing
        Pages 119-130
      2. Wilko Henecka, Nigel Bean, Matthew Roughan
        Pages 131-141
      3. Yang Wang, Man Ho Au, Willy Susilo
        Pages 142-153
      4. Xiaoqiong Pang, Bo Yang, Qiong Huang
        Pages 154-166
    6. Protocols

      1. Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou
        Pages 167-177
      2. Ning Ding, Dawu Gu
        Pages 178-190
      3. Jingwei Li, Chunfu Jia, Jin Li, Xiaofeng Chen
        Pages 191-201
      4. Atsushi Fujioka, Taiichi Saito, Keita Xagawa
        Pages 202-213
    7. Security in Mobile Systems

      1. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
        Pages 214-227
      2. Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, Zhong Chen
        Pages 228-239
    8. Software Security

      1. Ruoxu Zhao, Dawu Gu, Juanru Li, Hui Liu
        Pages 252-263
      2. Ricardo Corin, Felipe Andrés Manzano
        Pages 264-275
  3. Short Papers

    1. Authentication

      1. Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, Jianying Zhou
        Pages 276-284
      2. Nitesh Saxena, Jonathan Voris
        Pages 293-302
    2. Cryptanalysis

      1. Zhenqi Li, Yao Lu, Wenhao Wang, Bin Zhang, Dongdai Lin
        Pages 311-320
      2. Zhenqi Li, Bin Zhang, Yao Lu, Jing Zou, Dongdai Lin
        Pages 321-330
      3. Houssem Maghrebi, Olivier Rioul, Sylvain Guilley, Jean-Luc Danger
        Pages 331-340
    3. Multimedia Security and GPU-Enabled Computation

      1. Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, Siu Ming Yiu
        Pages 341-348
    4. Network Security

      1. Sendong Zhao, Ding Wang, Sicheng Zhao, Wu Yang, Chunguang Ma
        Pages 365-372
      2. Ting Dai, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang
        Pages 373-380
      3. Daewon Kim, Byoungkoo Kim, Ikkyun Kim, Jeongnyeo Kim, Hyunsook Cho
        Pages 381-391
    5. Privacy

      1. Wei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen
        Pages 400-407
      2. Arej Muhammed, Dan Lin, Anna Squicciarini
        Pages 427-434
      3. Liangwen Yu, Jiawei Zhu, Zhengang Wu, Tao Yang, Jianbin Hu, Zhong Chen
        Pages 435-444
      4. Tat Wing Chim, Siu Ming Yiu, Lucas Chi Kwong Hui, Victor On Kwok Li, Tin Wing Mui, Yu Hin Tsang et al.
        Pages 445-452
    6. Protocols

      1. Lin You, Mengsheng Fan, Jie Lu, Shengguo Wang, Fenghai Li
        Pages 453-460
      2. Carl Löndahl, Thomas Johansson
        Pages 461-470
      3. Seiko Arita
        Pages 471-478
      4. Yanli Ren, Shuozhong Wang, Xinpeng Zhang
        Pages 479-487
    7. Software Security

      1. Rafiqul Islam, Irfan Altas
        Pages 488-496
      2. Shanqing Guo, Shuangshuang Li, Yan Yu, Anlei Hu, Tao Ban
        Pages 497-504

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012.
The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.

Keywords

combinatorial cryptosystem distributed denial-of-service attack network security polynomial interpolation vulnerability detection

Editors and affiliations

  • Tat Wing Chim
    • 1
  • Tsz Hon Yuen
    • 2
  1. 1.Department of Computer ScienceThe University of Hong KongHong Kong, China
  2. 2.Department of Computer ScienceThe University of Hong KongHong Kong, China

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-34129-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34128-1
  • Online ISBN 978-3-642-34129-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site