default search action
14. ICICS 2012: Hong Kong, China
- Tat Wing Chim, Tsz Hon Yuen:
Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings. Lecture Notes in Computer Science 7618, Springer 2012, ISBN 978-3-642-34128-1
Full Papers
- Fatiha Djebbar, Beghdad Ayad:
Audio Steganalysis Based on Lossless Data-Compression Techniques. 1-9 - Yang-Wai Chow, Willy Susilo, Duncan S. Wong:
Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme. 10-21 - Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, Juanjo Alins:
Impact of the Revocation Service in PKI Prices. 22-32 - Hatem M. Bahig, Ashraf Bhery, Dieaa I. Nassr:
Cryptanalysis of Multi-Prime RSA with Small Prime Difference. 33-44 - Jun Xu, Lei Hu, Siwei Sun:
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem. 45-57 - Shusheng Liu, Zheng Gong, Libin Wang:
Improved Related-Key Differential Attacks on Reduced-Round LBlock. 58-69 - Yajuan Tang:
Countermeasures on Application Level Low-Rate Denial-of-Service Attack. 70-80 - Zouheir Trabelsi, Liren Zhang, Safaa Zeidan:
Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test. 81-92 - John Felix Charles Joseph, Ali A. Ghorbani:
Group Behavior Metrics for P2P Botnet Detection. 93-104 - Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, Xingjie Yu:
Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA. 105-118 - Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu-Ming Yiu, Sihan Qing:
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model. 119-130 - Wilko Henecka, Nigel G. Bean, Matthew Roughan:
Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain. 131-141 - Yang Wang, Man Ho Au, Willy Susilo:
Perfect Ambiguous Optimistic Fair Exchange. 142-153 - Xiaoqiong Pang, Bo Yang, Qiong Huang:
Privacy-Preserving Noisy Keyword Search in Cloud Computing. 154-166 - Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou:
Forward Secure Attribute-Based Signatures. 167-177 - Ning Ding, Dawu Gu:
On Constant-Round Precise Zero-Knowledge. 178-190 - Jingwei Li, Chunfu Jia, Jin Li, Xiaofeng Chen:
Outsourcing Encryption of Attribute-Based Encryption with MapReduce. 191-201 - Atsushi Fujioka, Taiichi Saito, Keita Xagawa:
Security Enhancement of Identity-Based Identification with Reversibility. 202-213 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture. 214-227 - Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, Zhong Chen:
Permission-Based Abnormal Application Detection for Android. 228-239 - Vrizlynn L. L. Thing, Darell J. J. Tan:
Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data. 240-251 - Ruoxu Zhao, Dawu Gu, Juanru Li, Hui Liu:
Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis. 252-263 - Ricardo Corin, Felipe Andrés Manzano:
Taint Analysis of Security Code in the KLEE Symbolic Execution Engine. 264-275
Short Papers
- Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, Jianying Zhou:
A Generic Approach for Providing Revocation Support in Secret Handshake. 276-284 - Anjia Yang, Yunhui Zhuang, Duncan S. Wong:
An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy. 285-292 - Nitesh Saxena, Jonathan Voris:
Exploring Mobile Proxies for Better Password Authentication. 293-302 - Aysajan Abidin:
On Security of Universal Hash Function Based Multiple Authentication. 303-310 - Zhenqi Li, Yao Lu, Wenhao Wang, Bin Zhang, Dongdai Lin:
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack. 311-320 - Zhenqi Li, Bin Zhang, Yao Lu, Jing Zou, Dongdai Lin:
Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack. 321-330 - Houssem Maghrebi, Olivier Rioul, Sylvain Guilley, Jean-Luc Danger:
Comparison between Side-Channel Analysis Distinguishers. 331-340 - Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, Siu-Ming Yiu:
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware. 341-348 - Yuxin Meng, Wenjuan Li:
Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme. 349-356 - Yong Liu, Meishan Huang, Bogang Lin:
Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition. 357-364 - Sendong Zhao, Ding Wang, Sicheng Zhao, Wu Yang, Chunguang Ma:
Cookie-Proxy: A Scheme to Prevent SSLStrip Attack. 365-372 - Ting Dai, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang:
Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer. 373-380 - Daewon Kim, Byoung-Koo Kim, Ikkyun Kim, Jeongnyeo Kim, Hyunsook Cho:
Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding. 381-391 - Yan Cao, Qiang Wei, Qingxian Wang:
Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance. 392-399 - Wei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen:
A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains. 400-407 - Yan Zhang, Dengguo Feng:
Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography. 408-415 - Huimin Shuai, Wen Tao Zhu:
F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances. 416-426 - Arej Muhammed, Dan Lin, Anna Cinzia Squicciarini:
Location Privacy Policy Management System. 427-434 - Liangwen Yu, Jiawei Zhu, Zhengang Wu, Tao Yang, Jian-bin Hu, Zhong Chen:
Privacy Protection in Social Networks Using l-Diversity. 435-444 - Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li, Tin Wing Mui, Yu Hin Tsang, Chun Kin Kwok, Kwun Yin Yu:
Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner. 445-452 - Lin You, Mengsheng Fan, Jie Lu, Shengguo Wang, Fenghai Li:
A Key Sharing Fuzzy Vault Scheme. 453-460 - Carl Löndahl, Thomas Johansson:
A New Version of McEliece PKC Based on Convolutional Codes. 461-470 - Seiko Arita:
Flexible Attribute-Based Encryption. 471-478 - Yanli Ren, Shuozhong Wang, Xinpeng Zhang:
Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles. 479-487 - Md. Rafiqul Islam, Irfan Altas:
A Comparative Study of Malware Family Classification. 488-496 - Shanqing Guo, Shuangshuang Li, Yan Yu, Anlei Hu, Tao Ban:
A Fine-Grained Classification Approach for the Packed Malicious Code. 497-504
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.