Information and Communications Security

18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings

  • Kwok-Yan Lam
  • Chi-Hung Chi
  • Sihan Qing
Conference proceedings ICICS 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9977)

Also part of the Security and Cryptology book sub series (LNSC, volume 9977)

Table of contents

  1. Front Matter
    Pages I-XII
  2. IoT Security

    1. Front Matter
      Pages 1-1
    2. Johannes Bauer, Ralf C. Staudemeyer, Henrich C. Pöhls, Alexandros Fragkiadakis
      Pages 3-17
    3. Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu, Limin Sun
      Pages 27-36
  3. Cloud Security

    1. Front Matter
      Pages 37-37
    2. Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, Meng Li
      Pages 39-53
    3. Wei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun
      Pages 54-70
    4. Lei Lei, Quanwei Cai, Bo Chen, Jingqiang Lin
      Pages 71-84
  4. Applied Cryptography

    1. Front Matter
      Pages 85-85
    2. Kewei Lv, Si-wei Ren, Wenjie Qin
      Pages 87-98
    3. Nan Yao, Yu Yu, Xiangxue Li, Dawu Gu
      Pages 99-106
    4. Wenwen Wang, Kewei Lv, Jianing Liu
      Pages 124-133
    5. Viktor Monarev, Ilja Duplischev, Andrey Pestunov
      Pages 134-144
    6. Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai
      Pages 145-156
  5. Attack Behavior Analytics

    1. Front Matter
      Pages 157-157
    2. Peizhi Shao, Jiuming Lu, Raymond K. Wong, Wenzhuo Yang
      Pages 159-172
    3. Thanh Nghia Ho, Wee Keong Ng
      Pages 173-183
    4. Chuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu
      Pages 184-194
  6. Authentication and Authorization

    1. Front Matter
      Pages 195-195
    2. Christoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin
      Pages 197-213
    3. Yang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu
      Pages 214-226
  7. Engineering Issues of Cryptographic and Security Systems

    1. Front Matter
      Pages 239-239
    2. Martin Draschl, Jutta Hämmerle-Uhl, Andreas Uhl
      Pages 241-253
    3. B. S. Vidyalakshmi, Raymond Wong
      Pages 262-277
    4. Thomas Hütter, Mario Preishuber, Jutta Hämmerle-Uhl, Andreas Uhl
      Pages 278-291
    5. Yuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin
      Pages 292-306
    6. Wei Cheng, Yongbin Zhou, Laurent Sauvage
      Pages 307-317
  8. Privacy Protection

    1. Front Matter
      Pages 319-319
    2. Hoang Giang Do, Wee Keong Ng
      Pages 321-332
    3. Raymond K. Wong, B. S. Vidyalakshmi
      Pages 333-346
  9. Risk Evaluation and Security

    1. Front Matter
      Pages 359-359
    2. Weijuan Zhang, Xiaoqi Jia, Chang Wang, Shengzhi Zhang, Qingjia Huang, Mingsheng Wang et al.
      Pages 361-375
    3. Robert Buhren, Julian Vetter, Jan Nordholz
      Pages 376-391
    4. M. W. David, C. R. Yerkes, M. E. Simmons, W. Franceschini
      Pages 392-399
  10. Key Management and Language-Based Security

    1. Front Matter
      Pages 401-401
    2. Peeter Laud, Alisa Pankova
      Pages 418-430
    3. Weijin Wang, Yu Qin, Bo Yang, Yingjun Zhang, Dengguo Feng
      Pages 431-441
  11. Network Security

    1. Front Matter
      Pages 443-443
    2. Xin Wang, Neng Gao, Lingchen Zhang, Zongbin Liu, Lei Wang
      Pages 455-465
    3. Dali Zhu, Renjun Zhang, Xiaozhuo Gu, Haitao Zhu
      Pages 466-475
  12. Back Matter
    Pages 477-478

About these proceedings


This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.
The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.


embedded security network security privacy protections security services social engineering attacks cloud storage cryptography cybersecurity formal method hardware-based security protocols information hiding machine learning public-key encryption recommender system security analytics security requirements social aspects of security and privacy software and application security trust frameworks usability in security and privacy

Editors and affiliations

  • Kwok-Yan Lam
    • 1
  • Chi-Hung Chi
    • 2
  • Sihan Qing
    • 3
  1. 1.Nanyang Technological University SingaporeSingapore
  2. 2.CSIRO HobartAustralia
  3. 3.Peking University BeijingChina

Bibliographic information

Industry Sectors
Finance, Business & Banking
IT & Software