default search action
15. ICICS 2013: Beijing, China
- Sihan Qing, Jianying Zhou, Dongmei Liu:
Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings. Lecture Notes in Computer Science 8233, Springer 2013, ISBN 978-3-319-02725-8
System Security
- Chee Meng Tey, Debin Gao:
Defending against Heap Overflow by Using Randomization in Nested Virtual Clusters. 1-16 - Zhenjiang Qian, Hao Huang, Fangmin Song:
VTOS: Research on Methodology of "Light-Weight" Formal Design and Verification for Microkernel OS. 17-32
Web Security and Worm Detection
- Wentao Chang, Songqing Chen:
Defeat Information Leakage from Browser Extensions via Data Obfuscation. 33-48 - Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang:
Rating Web Pages Using Page-Transition Evidence. 49-58 - Liang He, Dengguo Feng, Purui Su, Lingyun Ying, Yi Yang, Huafeng Huang, Huipeng Fang:
OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks. 59-74
Cloud Storage Security
- Jian Liu, Huimei Wang, Ming Xian, Kun Huang:
A Secure and Efficient Scheme for Cloud Storage against Eavesdropper. 75-89 - Shumiao Wang, Mohamed Nassar, Mikhail J. Atallah, Qutaibah M. Malluhi:
Secure and Private Outsourcing of Shape-Based Feature Extraction. 90-99
Virtualization for Cloud Computing
- Hong Rong, Ming Xian, Huimei Wang, Jiangyong Shi:
Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures. 100-112 - Smitha Sundareswaran, Anna Cinzia Squicciarini:
Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks. 113-124 - Qingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang, Sihan Qing, Zhonghai Wu:
A Covert Channel Using Event Channel State on Xen Hypervisor. 125-134
Trusted and Trustworthy Computing
- Jianxiong Shao, Dengguo Feng, Yu Qin:
Type-Based Analysis of Protected Storage in the TPM. 135-150 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators. 151-166
Authentication and Security Protocols
- Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou:
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model. 167-184 - Zheng Yang:
Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard Model. 185-193
Intrusion Detection and Recovery
- Eunjung Yoon, Peng Liu:
XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generation. 194-212 - Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis:
PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks. 213-228 - Jing Wang, Peng Liu, Limin Liu, Le Guan, Jiwu Jing:
Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels. 229-244
Side Channel Attacks and Defense
- Amir Moradi, Oliver Mischke:
Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure. 245-258 - Mingliang Feng, Yongbin Zhou, Zhenmei Yu:
EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods. 259-274
Engineering Issues of Crypto
- Yang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, Zhong Chen:
Accelerating AES in JavaScript with WebGL. 275-287 - Wenhao Wang, Dongdai Lin:
Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited. 288-301 - Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim:
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes. 302-317
Cryptanalysis
- Han Sui, Wenling Wu, Liting Zhang, Peng Wang:
Attacking and Fixing the CS Mode. 318-330 - Shengbao Wu, Mingsheng Wang:
Integral Attacks on Reduced-Round PRESENT. 331-345
Attribute-Based Encryption
- Y. Sreenivasa Rao, Ratna Dutta:
Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext. 346-362 - Huiling Qian, Jiguo Li, Yichen Zhang:
Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure. 363-372
Cryptographic Primitives and Applications
- Sébastien Canard, Iwen Coisel, Julien Devigne, Cécilia Gallais, Thomas Peters, Olivier Sanders:
Toward Generic Method for Server-Aided Cryptography. 373-392 - Zhi Hu, Lin Wang, Maozhi Xu, Guoliang Zhang:
Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One. 393-403 - Teng Guo, Feng Liu, Chuan Kun Wu, Ching-Nung Yang, Wen Wang, YaWei Ren:
Threshold Secret Image Sharing. 404-412
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.