Advertisement

Information and Communications Security

19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings

  • Sihan Qing
  • Chris Mitchell
  • Liqun Chen
  • Dongmei Liu
Conference proceedings ICICS 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10631)

Also part of the Security and Cryptology book sub series (LNSC, volume 10631)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Formal Analysis and Randomness Test

    1. Front Matter
      Pages 1-1
    2. Weijin Wang, Jingbin Liu, Yu Qin, Dengguo Feng
      Pages 3-16
    3. Jiahui Shen, Tianyu Chen, Lei Wang, Yuan Ma
      Pages 17-35
  3. Signature Scheme and Key Management

    1. Front Matter
      Pages 37-37
    2. Ruo Mo, Jianfeng Ma, Ximeng Liu, Qi Li
      Pages 39-50
    3. Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li
      Pages 51-62
  4. Algorithms

    1. Front Matter
      Pages 63-63
    2. Bei Liang, Aikaterini Mitrokotsa
      Pages 81-87
    3. Shuang Qiu, Rui Zhang, Yongbin Zhou, Hailong Zhang
      Pages 88-101
  5. Applied Cryptography

    1. Front Matter
      Pages 103-103
    2. Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng
      Pages 105-117
    3. Xueqing Wang, Biao Wang, Rui Xue
      Pages 118-131
    4. Jie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang
      Pages 132-140
    5. Zhedong Wang, Xiong Fan, Mingsheng Wang
      Pages 141-153
    6. Daode Zhang, Bao Li, Yamin Liu, Haiyang Xue, Xianhui Lu, Dingding Jia
      Pages 154-161
    7. Qingsong Zhao, Qingkai Zeng, Ximeng Liu
      Pages 162-171
    8. Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Guang Zeng
      Pages 172-179
    9. Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu
      Pages 180-191
    10. Xinyu Feng, Cong Li, Dan Li, Yuejian Fang, Qingni Shen
      Pages 192-204
    11. Kanika Gupta, S. Sharmila Deva Selvi, C. Pandu Rangan, Shubham Sopan Dighe
      Pages 205-209
    12. Daode Zhang, Fuyang Fang, Bao Li, Haiyang Xue, Bei Liang
      Pages 210-221
  6. Attacks and Attacks Defense

    1. Front Matter
      Pages 223-223
    2. Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendoerfer
      Pages 225-235
    3. Soyoung Ahn, Hyang-Sook Lee, Seongan Lim, Ikkwon Yie
      Pages 248-254
    4. Kang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu
      Pages 255-262
  7. Wireless Sensor Network Security

    1. Front Matter
      Pages 263-263
    2. Feiyang Peng, Zhihong Liu, Yong Zeng, Jialei Wang
      Pages 265-275
    3. Meigen Huang, Bin Yu
      Pages 276-287
  8. Security Applications

    1. Front Matter
      Pages 289-289
    2. Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng
      Pages 291-303
    3. Xueping Liang, Sachin Shetty, Deepak Tosh, Peter Foytik, Lingchen Zhang
      Pages 304-310
  9. Malicious Code Defense and Mobile Security

    1. Front Matter
      Pages 311-311
    2. Guangli Xiang, Lu Yu, Beilei Li, Mengsen Xia
      Pages 325-335
  10. IoT Security

    1. Front Matter
      Pages 337-337
    2. Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang et al.
      Pages 374-384
  11. Healthcare and Industrial Control System Security

    1. Front Matter
      Pages 385-385
    2. Xueping Liang, Sachin Shetty, Juan Zhao, Daniel Bowden, Danyi Li, Jihong Liu
      Pages 387-398
  12. Privacy Protection

    1. Front Matter
      Pages 425-425
    2. Ying Xia, Yu Huang, Xu Zhang, HaeYoung Bae
      Pages 438-445

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.

The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. 

Keywords

accesss control artificial intelligence authentication computer crime computer networks cryptography data mining data privacy data security electronic document identification systems encryption network security privacy preserving public key cryptography security security systems sensors software engineering telecommunication networks

Editors and affiliations

  • Sihan Qing
    • 1
  • Chris Mitchell
    • 2
  • Liqun Chen
    • 3
  • Dongmei Liu
    • 4
  1. 1.Chinese Academy of Sciences and Peking UniversityBeijingChina
  2. 2.Royal Holloway, University of LondonEghamUnited Kingdom
  3. 3.University of SurreyGuildfordUnited Kingdom
  4. 4.MicrosoftBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-89500-0
  • Copyright Information Springer International Publishing AG, part of Springer Nature 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-89499-7
  • Online ISBN 978-3-319-89500-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace