Skip to main content
  • Conference proceedings
  • © 2012

Information and Communications Security

14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7618)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (49 papers)

  1. Full Papers

    1. Security in Mobile Systems

      1. Permission-Based Abnormal Application Detection for Android
        • Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, Zhong Chen
        Pages 228-239
    2. Software Security

      1. Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis
        • Ruoxu Zhao, Dawu Gu, Juanru Li, Hui Liu
        Pages 252-263
      2. Taint Analysis of Security Code in the KLEE Symbolic Execution Engine
        • Ricardo Corin, Felipe Andrés Manzano
        Pages 264-275
  2. Short Papers

    1. Authentication

      1. A Generic Approach for Providing Revocation Support in Secret Handshake
        • Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, Jianying Zhou
        Pages 276-284
      2. Exploring Mobile Proxies for Better Password Authentication
        • Nitesh Saxena, Jonathan Voris
        Pages 293-302
    2. Cryptanalysis

      1. A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying’s Attack
        • Zhenqi Li, Yao Lu, Wenhao Wang, Bin Zhang, Dongdai Lin
        Pages 311-320
      2. Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack
        • Zhenqi Li, Bin Zhang, Yao Lu, Jing Zou, Dongdai Lin
        Pages 321-330
      3. Comparison between Side-Channel Analysis Distinguishers
        • Houssem Maghrebi, Olivier Rioul, Sylvain Guilley, Jean-Luc Danger
        Pages 331-340
    3. Multimedia Security and GPU-Enabled Computation

      1. Acceleration of Composite Order Bilinear Pairing on Graphics Hardware
        • Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, Siu Ming Yiu
        Pages 341-348
    4. Network Security

      1. Cookie-Proxy: A Scheme to Prevent SSLStrip Attack
        • Sendong Zhao, Ding Wang, Sicheng Zhao, Wu Yang, Chunguang Ma
        Pages 365-372
      2. Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer
        • Ting Dai, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang
        Pages 373-380
      3. Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding
        • Daewon Kim, Byoungkoo Kim, Ikkyun Kim, Jeongnyeo Kim, Hyunsook Cho
        Pages 381-391
    5. Privacy

      1. A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains
        • Wei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen
        Pages 400-407

Other Volumes

  1. Information and Communications Security

About this book

This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.

Editors and Affiliations

  • Department of Computer Science, The University of Hong Kong, Hong Kong, China

    Tat Wing Chim, Tsz Hon Yuen

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access