Information and communications security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings /
Saved in:
Meeting name: | ICICS (Conference) (15th : 2013 : Beijing, China) |
---|---|
Imprint: | Cham : Springer, 2013. |
Description: | 1 online resource (xiv, 414 pages) : illustrations. |
Language: | English |
Series: | Lecture Notes in Computer Science, 0302-9743 ; 8233 LNCS sublibrary. SL 4, Security and cryptology Lecture notes in computer science ; 8233. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11081957 |
Table of Contents:
- System Security. Defending against Heap Overflow by Using Randomization in Nested Virtual Clusters / Chee Meng Tey and Debin Gao
- VTOS: Research on Methodology of "Light-Weight" Formal Design and Verification for Microkernel OS / Zhenjiang Qian, Hao Huang and Fangmin Song
- Web Security and Worm Detection. Defeat Information Leakage from Browser Extensions via Data Obfuscation / Wentao Chang and Songqing Chen
- Rating Web Pages Using Page-Transition Evidence / Jian Mao [and others]
- OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks / Liang He [and others]
- Cloud Storage Security. A Secure and Efficient Scheme for Cloud Storage against Eavesdropper / Jian Liu [and others]
- Secure and Private Outsourcing of Shape-Based Feature Extraction / Shumiao Wang [and others].
- Virtualization for Cloud Computing. Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures / Hong Rong [and others]
- Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks / Smitha Sundareswaran and Anna C. Squcciarini
- A Covert Channel Using Event Channel State on Xen Hypervisor / Qingni Shen [and others]
- Trusted and Trustworthy Computing. Type-Based Analysis of Protected Storage in the TPM / Jianxiong Shao, Dengguo Feng and Yu Qin
- Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators / Raja Naeem Akram, Konstantinos Markantonakis and Keith Mayes
- Authentication and Security Protocols. Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model / Xiangxue Li [and others]
- Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard Model / Zheng Yang.
- Intrusion Detection and Recovery. XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generation / Eunjung Yoon and Peng Liu
- PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks / Amin Hassanzadeh [and others]
- Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels / Jing Wang [and others]
- Side Channel Attacks and Defense. Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure / Amir Moradi and Oliver Mischke
- EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods / Mingliang Feng, Yongbin Zhou and Zhenmei Yu
- Engineering Issues of Crypto. Accelerating AES in JavaScript with WebGL / Yang Yang [and others]
- Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited / Wenhao Wang and Dongdai Lin
- Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes / Zhe Liu [and others].
- Cryptanalysis. Attacking and Fixing the CS Mode / Han Sui [and others]
- Integral Attacks on Reduced-Round PRESENT / Shengbao Wu and Mingsheng Wang
- Attribute-Based Encryption. Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext / Y. Sreenivasa Rao and Ratna Dutta
- Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure / Huiling Qian, Jiguo Li and Yichen Zhang
- Cryptographic Primitives and Applications. Toward Generic Method for Server-Aided Cryptography / SeĢbastien Canard [and others]
- Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One / Zhi Hu [and others]
- Threshold Secret Image Sharing / Teng Guo [and others].