Information and Communications Security

15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings

  • Sihan Qing
  • Jianying Zhou
  • Dongmei Liu
Conference proceedings ICICS 2013

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8233)

Table of contents

  1. Front Matter
  2. System Security

  3. Web Security and Worm Detection

    1. Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang
      Pages 49-58
    2. Liang He, Dengguo Feng, Purui Su, Lingyun Ying, Yi Yang, Huafeng Huang et al.
      Pages 59-74
  4. Cloud Storage Security

    1. Jian Liu, Huimei Wang, Ming Xian, Kun Huang
      Pages 75-89
    2. Shumiao Wang, Mohamed Nassar, Mikhail Atallah, Qutaibah Malluhi
      Pages 90-99
  5. Virtualization for Cloud Computing

    1. Hong Rong, Ming Xian, Huimei Wang, Jiangyong Shi
      Pages 100-112
    2. Smitha Sundareswaran, Anna C. Squcciarini
      Pages 113-124
    3. Qingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang, Sihan Qing, Zhonghai Wu
      Pages 125-134
  6. Trusted and Trustworthy Computing

    1. Jianxiong Shao, Dengguo Feng, Yu Qin
      Pages 135-150
    2. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
      Pages 151-166
  7. Authentication and Security Protocols

  8. Intrusion Detection and Recovery

    1. Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis
      Pages 213-228
    2. Jing Wang, Peng Liu, Limin Liu, Le Guan, Jiwu Jing
      Pages 229-244
  9. Side Channel Attacks and Defense

  10. Engineering Issues of Crypto

    1. Yang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, Zhong Chen
      Pages 275-287
    2. Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim
      Pages 302-317
  11. Cryptanalysis

    1. Han Sui, Wenling Wu, Liting Zhang, Peng Wang
      Pages 318-330
    2. Shengbao Wu, Mingsheng Wang
      Pages 331-345
  12. Attribute-Based Encryption

  13. Cryptographic Primitives and Applications

    1. Sébastien Canard, Iwen Coisel, Julien Devigne, Cécilia Gallais, Thomas Peters, Olivier Sanders
      Pages 373-392
    2. Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang, YaWei Ren
      Pages 404-412
  14. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications.


applied cryptography authentication information security network security privacy

Editors and affiliations

  • Sihan Qing
    • 1
  • Jianying Zhou
    • 2
  • Dongmei Liu
    • 1
  1. 1.Institute of SoftwareChinese Academy of SciencesBeijingChina
  2. 2.Institute for Infocomm Research, Infocom Security DepartmentSingaporeSingapore

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2013
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-02725-8
  • Online ISBN 978-3-319-02726-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software