Information and Communications Security

19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings

  • Sihan Qing
  • Chris Mitchell
  • Liqun Chen
  • Dongmei Liu
Conference proceedings ICICS 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10631)

Also part of the Security and Cryptology book sub series (LNSC, volume 10631)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Formal Analysis and Randomness Test

    1. Front Matter
      Pages 1-1
    2. Weijin Wang, Jingbin Liu, Yu Qin, Dengguo Feng
      Pages 3-16
    3. Jiahui Shen, Tianyu Chen, Lei Wang, Yuan Ma
      Pages 17-35
  3. Signature Scheme and Key Management

    1. Front Matter
      Pages 37-37
    2. Ruo Mo, Jianfeng Ma, Ximeng Liu, Qi Li
      Pages 39-50
    3. Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li
      Pages 51-62
  4. Algorithms

    1. Front Matter
      Pages 63-63
    2. Bei Liang, Aikaterini Mitrokotsa
      Pages 81-87
    3. Shuang Qiu, Rui Zhang, Yongbin Zhou, Hailong Zhang
      Pages 88-101
  5. Applied Cryptography

    1. Front Matter
      Pages 103-103
    2. Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng
      Pages 105-117
    3. Xueqing Wang, Biao Wang, Rui Xue
      Pages 118-131
    4. Jie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang
      Pages 132-140
    5. Zhedong Wang, Xiong Fan, Mingsheng Wang
      Pages 141-153
    6. Daode Zhang, Bao Li, Yamin Liu, Haiyang Xue, Xianhui Lu, Dingding Jia
      Pages 154-161
    7. Qingsong Zhao, Qingkai Zeng, Ximeng Liu
      Pages 162-171
    8. Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Guang Zeng
      Pages 172-179

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.

The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. 

Keywords

accesss control artificial intelligence authentication computer crime computer networks cryptography data mining data privacy data security electronic document identification systems encryption network security privacy preserving public key cryptography security security systems sensors software engineering telecommunication networks

Editors and affiliations

  • Sihan Qing
    • 1
  • Chris Mitchell
    • 2
  • Liqun Chen
    • 3
  • Dongmei Liu
    • 4
  1. 1.Chinese Academy of Sciences and Peking UniversityBeijingChina
  2. 2.Royal Holloway, University of LondonEghamUnited Kingdom
  3. 3.University of SurreyGuildfordUnited Kingdom
  4. 4.MicrosoftBeijingChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-89500-0
  • Copyright Information Springer International Publishing AG, part of Springer Nature 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-89499-7
  • Online ISBN 978-3-319-89500-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Electronics
Telecommunications
Aerospace
Pharma