Information and communications security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings /

Saved in:
Bibliographic Details
Meeting name:ICICS (Conference) (15th : 2013 : Beijing, China)
Imprint:Cham : Springer, 2013.
Description:1 online resource (xiv, 414 pages) : illustrations.
Language:English
Series:Lecture Notes in Computer Science, 0302-9743 ; 8233
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8233.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11081957
Hidden Bibliographic Details
Varying Form of Title:ICICS 2013
Other authors / contributors:Qing, Sihan, editor.
Zhou, Jianying, editor.
Liu, Dongmei (Computer scientist), editor.
ISBN:9783319027265
3319027263
3319027255
9783319027258
9783319027258
Notes:International conference proceedings.
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed November 4, 2013).
Summary:This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications.
Other form:Printed edition: 9783319027258
Standard no.:10.1007/978-3-319-02726-5
Table of Contents:
  • System Security. Defending against Heap Overflow by Using Randomization in Nested Virtual Clusters / Chee Meng Tey and Debin Gao
  • VTOS: Research on Methodology of "Light-Weight" Formal Design and Verification for Microkernel OS / Zhenjiang Qian, Hao Huang and Fangmin Song
  • Web Security and Worm Detection. Defeat Information Leakage from Browser Extensions via Data Obfuscation / Wentao Chang and Songqing Chen
  • Rating Web Pages Using Page-Transition Evidence / Jian Mao [and others]
  • OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks / Liang He [and others]
  • Cloud Storage Security. A Secure and Efficient Scheme for Cloud Storage against Eavesdropper / Jian Liu [and others]
  • Secure and Private Outsourcing of Shape-Based Feature Extraction / Shumiao Wang [and others].
  • Virtualization for Cloud Computing. Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures / Hong Rong [and others]
  • Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks / Smitha Sundareswaran and Anna C. Squcciarini
  • A Covert Channel Using Event Channel State on Xen Hypervisor / Qingni Shen [and others]
  • Trusted and Trustworthy Computing. Type-Based Analysis of Protected Storage in the TPM / Jianxiong Shao, Dengguo Feng and Yu Qin
  • Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators / Raja Naeem Akram, Konstantinos Markantonakis and Keith Mayes
  • Authentication and Security Protocols. Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model / Xiangxue Li [and others]
  • Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard Model / Zheng Yang.
  • Intrusion Detection and Recovery. XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generation / Eunjung Yoon and Peng Liu
  • PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks / Amin Hassanzadeh [and others]
  • Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels / Jing Wang [and others]
  • Side Channel Attacks and Defense. Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure / Amir Moradi and Oliver Mischke
  • EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods / Mingliang Feng, Yongbin Zhou and Zhenmei Yu
  • Engineering Issues of Crypto. Accelerating AES in JavaScript with WebGL / Yang Yang [and others]
  • Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited / Wenhao Wang and Dongdai Lin
  • Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes / Zhe Liu [and others].
  • Cryptanalysis. Attacking and Fixing the CS Mode / Han Sui [and others]
  • Integral Attacks on Reduced-Round PRESENT / Shengbao Wu and Mingsheng Wang
  • Attribute-Based Encryption. Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext / Y. Sreenivasa Rao and Ratna Dutta
  • Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure / Huiling Qian, Jiguo Li and Yichen Zhang
  • Cryptographic Primitives and Applications. Toward Generic Method for Server-Aided Cryptography / SeĢbastien Canard [and others]
  • Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One / Zhi Hu [and others]
  • Threshold Secret Image Sharing / Teng Guo [and others].