default search action
20th ICICS 2018: Lille, France
- David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi:
Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11149, Springer 2018, ISBN 978-3-030-01949-5
Full Paper Session I: Blockchain Technology
- Yuan Zhang, Xiaodong Lin, Chunxiang Xu:
Blockchain-Based Secure Data Provenance for Cloud Storage. 3-19 - Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter:
uMine: A Blockchain Based on Human Miners. 20-38
Full Paper Session II: Malware, Botnet and Network Security
- Xi Luo, Liming Wang, Zhen Xu, Wei An:
LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains. 41-56 - Jie Yin, Heyang Lv, Fangjiao Zhang, Zhihong Tian, Xiang Cui:
Study on Advanced Botnet Based on Publicly Available Resources. 57-74 - Yingpei Zeng, Shanqing Guo:
Deep Packet Inspection with Delayed Signature Matching in Network Auditing. 75-91 - Dan Tang, Rui Dai, Liu Tang, Sijia Zhan, Jianping Man:
Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis. 92-104
Full Paper Session III: Real-World Cryptography
- Chenyu Wang, Tao Huang, Hongjun Wu:
On the Weakness of Constant Blinding PRNG in Flash Player. 107-123 - George Teseleanu:
Random Number Generators Can Be Fooled to Behave Badly. 124-141 - Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong:
Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation. 142-157
Full Paper Session IV: Encrypted Computing
- Shakirah Hashim, Mohammed Benaissa:
Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain Multiplication. 161-176 - Alessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi:
Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes. 177-191 - Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu:
On Security in Encrypted Computing. 192-211
Full Paper Session V: Privacy Protection
- Meng Zheng, Jun Zhou, Zhenfu Cao, Xiaolei Dong:
PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing. 215-231 - Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens:
Linking Differential Identifiability with Differential Privacy. 232-247 - Zhili Chen, Sheng Chen, Hong Zhong, Lin Chen, Miaomiao Tian:
PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction. 248-267
Full Paper Session VI: Signature Schemes
- Lin Hou, Renzhang Liu, Tian Qiu, Dongdai Lin:
Hierarchical Group Signatures with Verifier-Local Revocation. 271-286 - Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation. 287-302 - Carsten Baum, Huang Lin, Sabine Oechsner:
Towards Practical Lattice-Based One-Time Linkable Ring Signatures. 303-322
Full Paper Session VII: Attack Analysis and Detection
- Zhiyuan Zhao, Chenxu Wang, Wei Rao:
Slop: Towards an Efficient and Universal Streaming Log Parser. 325-341 - Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng:
Community Discovery of Attribution Trace Based on Deep Learning Approach. 342-357 - Yun Guo, Daniel Sun, Guoqiang Li, Shiping Chen:
Examine Manipulated Datasets with Topology Data Analysis: A Case Study. 358-373
Full Paper Session VIII: Searchable Encryption and Identity-Based Cryptography
- Yunong Liang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen:
Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption. 377-392 - Cédric Van Rompay, Refik Molva, Melek Önen:
Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage. 393-408 - Kelly Yun, Xin Wang, Rui Xue:
Identity-Based Functional Encryption for Quadratic Functions from Lattices. 409-425 - Rui Zhang, Yang Tao:
Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption. 426-441
Full Paper Session IX: Verifiable Storage and Computing
- Changsong Yang, Jianfeng Wang, Xiaoling Tao, Xiaofeng Chen:
Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage. 445-458 - Henning Kopp, Frank Kargl, Christoph Bösch:
Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons. 459-477 - Xingfeng Wang, Liang Zhao:
Verifiable Single-Server Private Information Retrieval. 478-493
Full Paper Session X: Applied Cryptography
- Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan:
Cryptographic Password Obfuscation. 497-512 - Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan:
CCA Secure Multi-recipient KEM from LPN. 513-529 - Hiroaki Anada, Seiko Arita:
Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global Identities. 530-547
Full Paper Session XI: Supporting Techniques
- Kai Chen, Ning Zhang, Liming Wang, Zhen Xu:
Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree. 551-565 - Min Zhu, Kun Zhang, Bibo Tu:
PCA: Page Correlation Aggregation for Memory Deduplication in Virtualized Environments. 566-583 - Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu:
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data. 584-597 - Yao Lu, Noboru Kunihiro, Rui Zhang, Liqiang Peng, Hui Ma:
Certifying Variant of RSA with Generalized Moduli. 598-608
Full Paper Session XII: Formal Analysis and Cryptanalysis
- Florian Kammüller:
Attack Trees in Isabelle. 611-628 - Fan Zhang, Cong Zhang, Mingdi Xu, Xiaoli Liu, Fangning Hu, Han-Chieh Chao:
Automated Verification of Noninterference Property. 629-646 - Ya Han, Yongqiang Li, Mingsheng Wang:
Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets. 647-663 - Mingjiang Huang, Liming Wang, Yan Zhang:
Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications. 664-681
Short Paper Session I: Attack Detection
- Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li:
MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query. 685-695 - Abdullahi Chowdhury, Gour C. Karmakar, Joarder Kamruzzaman, Tapash Saha:
Detecting Intrusion in the Traffic Signals of an Intelligent Traffic System. 696-707 - Mamoru Mimura, Hidema Tanaka:
A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs. 708-718
Short Paper Session II: Security Management
- Lin Wang, Min Zhu, Qing Li, Bibo Tu:
Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters. 721-731 - Xiaoshu Ji, Gurvan Le Guernic, Nora Cuppens-Boulahia, Frédéric Cuppens:
USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework. 732-742
Short Paper Session III: Applied Cryptography
- Carlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval:
FPGA-Based Assessment of Midori and Gift Lightweight Block Ciphers. 745-755 - Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan:
Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor. 756-766 - Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng:
PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX. 767-777
Short Paper Session IV: Applied Cryptography
- Thanh Bui, Tuomas Aura:
Application of Public Ledgers to Revocation in Distributed Access Control. 781-792 - Peifang Ni, Hongda Li, Dongxue Pan:
Micropaying to a Distributed Payee with Instant Confirmation. 793-804 - Ping Wang, Zijian Zhang, Ding Wang:
Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment. 805-816
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.