default search action
18. ICICS 2016: Singapore
- Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing:
Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings. Lecture Notes in Computer Science 9977, Springer 2016, ISBN 978-3-319-50010-2
IoT Security
- Johannes Bauer, Ralf C. Staudemeyer, Henrich C. Pöhls, Alexandros G. Fragkiadakis:
ECDSA on Things: IoT Integrity Protection in Practise. 3-17 - Kwok-Yan Lam, Chi-Hung Chi:
Identity in the Internet-of-Things (IoT): New Challenges and Opportunities. 18-26 - Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu, Limin Sun:
A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. 27-36
Cloud Security
- Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, Meng Li:
A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks. 39-53 - Wei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun:
Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System. 54-70 - Lei Lei, Quanwei Cai, Bo Chen, Jingqiang Lin:
Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds. 71-84
Applied Cryptography
- Kewei Lv, Si-Wei Ren, Wenjie Qin:
The Security of Individual Bit for XTR. 87-98 - Nan Yao, Yu Yu, Xiangxue Li, Dawu Gu:
On the Robustness of Learning Parity with Noise. 99-106 - Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu:
The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight. 107-123 - Wenwen Wang, Kewei Lv, Jianing Liu:
The Variant of Remote Set Problem on Lattices. 124-133 - Viktor Monarev, Ilja Duplischev, Andrey Pestunov:
Compression-Based Integral Prior Classification for Improving Steganalysis. 134-144 - Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:
Group Verification Based Multiple-Differential Collision Attack. 145-156
Attack Behavior Analytics
- Peizhi Shao, Jiuming Lu, Raymond K. Wong, Wenzhuo Yang:
A Transparent Learning Approach for Attack Prediction Based on User Behavior Analysis. 159-172 - Thanh Nghia Ho, Wee Keong Ng:
Application of Stylometry to DarkWeb Forum User Identification. 173-183 - Chuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu:
SECapacity: A Secure Capacity Scheduler in YARN. 184-194
Authentication and Authorization
- Christoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin:
Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT. 197-213 - Yang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu:
MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud. 214-226 - Bo Song, Yiming Zhao:
Provably Secure Identity-Based Identification and Signature Schemes with Parallel-PVR. 227-238
Engineering Issues of Cryptographic and Security Systems
- Martin Draschl, Jutta Hämmerle-Uhl, Andreas Uhl:
Assessment of Efficient Fingerprint Image Protection Principles Using Different Types of AFIS. 241-253 - Paul Tak Shing Liu:
Medical Record System Using Blockchain, Big Data and Tokenization. 254-261 - B. S. Vidyalakshmi, Raymond K. Wong:
Is it Good or Bad? Disclosure of Medical Ailments on Twitter. 262-277 - Thomas Hütter, Mario Preishuber, Jutta Hämmerle-Uhl, Andreas Uhl:
Weaknesses in Security Considerations Related to Chaos-Based Image Encryption. 278-291 - Yuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin:
Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields. 292-306 - Wei Cheng, Yongbin Zhou, Laurent Sauvage:
Differential Fault Analysis on Midori. 307-317
Privacy Protection
- Hoang Giang Do, Wee Keong Ng:
Private Boolean Query Processing on Encrypted Data. 321-332 - Raymond K. Wong, B. S. Vidyalakshmi:
Privacy Leakage via Attribute Inference in Directed Social Networks. 333-346 - Shen Yan, Shiran Pan, Wen Tao Zhu, Keke Chen:
DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy. 347-357
Risk Evaluation and Security
- Weijuan Zhang, Xiaoqi Jia, Chang Wang, Shengzhi Zhang, Qingjia Huang, Mingsheng Wang, Peng Liu:
A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds. 361-375 - Robert Buhren, Julian Vetter, Jan Nordholz:
The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture. 376-391 - M. W. David, C. R. Yerkes, M. E. Simmons, W. Franceschini:
Towards Trustworthy Smart Cyber-Physical Systems. 392-399
Key Management and Language-Based Security
- Da-Zhi Sun, Xiao-Hong Li:
Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3. 403-417 - Peeter Laud, Alisa Pankova:
Optimizing Secure Computation Programs with Private Conditionals. 418-430 - Weijin Wang, Yu Qin, Bo Yang, Yingjun Zhang, Dengguo Feng:
Automated Security Proof of Cryptographic Support Commands in TPM 2.0. 431-441
Network Security
- Sumit Kumar Debnath, Ratna Dutta:
How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity. 445-454 - Xin Wang, Neng Gao, Lingchen Zhang, Zongbin Liu, Lei Wang:
Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study. 455-465 - Dali Zhu, Renjun Zhang, Xiaozhuo Gu, Haitao Zhu:
A Practical Scheme for Data Secure Transport in VoIP Conferencing. 466-475
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.