Limit search to available items
Book Cover
E-book
Author ICICS (Conference) (15th : 2013 : Beijing, China)

Title Information and communications security : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings / Sihan Qing, Jianying Zhou, Dongmei Liu (eds.)
Published Cham : Springer, 2013
Online access available from:
Springer eBooks    View Resource Record  

Copies

Description 1 online resource (xiv, 414 pages) : illustrations
Series Lecture Notes in Computer Science, 0302-9743 ; 8233
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8233. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents System Security. Defending against Heap Overflow by Using Randomization in Nested Virtual Clusters / Chee Meng Tey and Debin Gao -- VTOS: Research on Methodology of "Light-Weight" Formal Design and Verification for Microkernel OS / Zhenjiang Qian, Hao Huang and Fangmin Song -- Web Security and Worm Detection. Defeat Information Leakage from Browser Extensions via Data Obfuscation / Wentao Chang and Songqing Chen -- Rating Web Pages Using Page-Transition Evidence / Jian Mao [and others] -- OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks / Liang He [and others] -- Cloud Storage Security. A Secure and Efficient Scheme for Cloud Storage against Eavesdropper / Jian Liu [and others] -- Secure and Private Outsourcing of Shape-Based Feature Extraction / Shumiao Wang [and others]
Virtualization for Cloud Computing. Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures / Hong Rong [and others] -- Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks / Smitha Sundareswaran and Anna C. Squcciarini -- A Covert Channel Using Event Channel State on Xen Hypervisor / Qingni Shen [and others] -- Trusted and Trustworthy Computing. Type-Based Analysis of Protected Storage in the TPM / Jianxiong Shao, Dengguo Feng and Yu Qin -- Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators / Raja Naeem Akram, Konstantinos Markantonakis and Keith Mayes -- Authentication and Security Protocols. Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model / Xiangxue Li [and others] -- Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard Model / Zheng Yang
Intrusion Detection and Recovery. XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generation / Eunjung Yoon and Peng Liu -- PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks / Amin Hassanzadeh [and others] -- Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels / Jing Wang [and others] -- Side Channel Attacks and Defense. Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure / Amir Moradi and Oliver Mischke -- EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods / Mingliang Feng, Yongbin Zhou and Zhenmei Yu -- Engineering Issues of Crypto. Accelerating AES in JavaScript with WebGL / Yang Yang [and others] -- Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited / Wenhao Wang and Dongdai Lin -- Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes / Zhe Liu [and others]
Cryptanalysis. Attacking and Fixing the CS Mode / Han Sui [and others] -- Integral Attacks on Reduced-Round PRESENT / Shengbao Wu and Mingsheng Wang -- Attribute-Based Encryption. Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext / Y. Sreenivasa Rao and Ratna Dutta -- Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure / Huiling Qian, Jiguo Li and Yichen Zhang -- Cryptographic Primitives and Applications. Toward Generic Method for Server-Aided Cryptography / S├ębastien Canard [and others] -- Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One / Zhi Hu [and others] -- Threshold Secret Image Sharing / Teng Guo [and others]
Summary This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications
Notes International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed November 4, 2013)
Subject Computer networks -- Security measures -- Congresses.
Data protection -- Congresses.
Data encryption (Computer science) -- Congresses.
Computer Communication Networks.
Computer Security.
Genre/Form Conference papers and proceedings.
Congress.
Conference papers and proceedings.
Form Electronic book
Author Qing, Sihan, editor
Zhou, Jianying, editor
Liu, Dongmei (Computer scientist), editor
ISBN 9783319027265 (electronic bk.)
3319027263 (electronic bk.)
3319027255 (Trade Paper)
9783319027258 (Trade Paper)
Other Titles ICICS 2013