Skip to main content
  • Conference proceedings
  • © 2012

Information and Communications Security

14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings

  • Fast-track conference proceedings

  • State-of-the-art research

  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7618)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2012.

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-34129-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 107.00
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (49 papers)

  1. Front Matter

  2. Full Papers

    1. Applied Cryptography

      1. Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme
        • Yang-Wai Chow, Willy Susilo, Duncan S. Wong
        Pages 10-21
      2. Impact of the Revocation Service in PKI Prices
        • Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, Juanjo Alins
        Pages 22-32
    2. Cryptanalysis

      1. Cryptanalysis of Multi-Prime RSA with Small Prime Difference
        • Hatem M. Bahig, Ashraf Bhery, Dieaa I. Nassr
        Pages 33-44
      2. Improved Related-Key Differential Attacks on Reduced-Round LBlock
        • Shusheng Liu, Zheng Gong, Libin Wang
        Pages 58-69
    3. Network Security

      1. Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test
        • Zouheir Trabelsi, Liren Zhang, Safaa Zeidan
        Pages 81-92
      2. Group Behavior Metrics for P2P Botnet Detection
        • John Felix, Charles Joseph, Ali A. Ghorbani
        Pages 93-104
    4. Optimization

      1. Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA
        • Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, Xingjie Yu
        Pages 105-118
    5. Privacy

      1. Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model
        • Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu Ming Yiu, Sihan Qing
        Pages 119-130
      2. Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain
        • Wilko Henecka, Nigel Bean, Matthew Roughan
        Pages 131-141
      3. Perfect Ambiguous Optimistic Fair Exchange
        • Yang Wang, Man Ho Au, Willy Susilo
        Pages 142-153
      4. Privacy-Preserving Noisy Keyword Search in Cloud Computing
        • Xiaoqiong Pang, Bo Yang, Qiong Huang
        Pages 154-166
    6. Protocols

      1. Forward Secure Attribute-Based Signatures
        • Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou
        Pages 167-177
      2. On Constant-Round Precise Zero-Knowledge
        • Ning Ding, Dawu Gu
        Pages 178-190
      3. Outsourcing Encryption of Attribute-Based Encryption with MapReduce
        • Jingwei Li, Chunfu Jia, Jin Li, Xiaofeng Chen
        Pages 191-201
      4. Security Enhancement of Identity-Based Identification with Reversibility
        • Atsushi Fujioka, Taiichi Saito, Keita Xagawa
        Pages 202-213
    7. Security in Mobile Systems

      1. Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture
        • Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
        Pages 214-227

Other Volumes

  1. Information and Communications Security

About this book

This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.

Keywords

  • combinatorial cryptosystem
  • distributed denial-of-service attack
  • network security
  • polynomial interpolation
  • vulnerability detection
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Department of Computer Science, The University of Hong Kong, Hong Kong, China

    Tat Wing Chim, Tsz Hon Yuen

Bibliographic Information

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-34129-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 107.00
Price excludes VAT (USA)