Skip to main content
  • Conference proceedings
  • © 2018

Information and Communications Security

19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10631)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2017.

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (57 papers)

  1. Applied Cryptography

    1. Practical Large Universe Attribute-Set Based Encryption in the Standard Model

      • Xinyu Feng, Cancan Jin, Cong Li, Yuejian Fang, Qingni Shen, Zhonghai Wu
      Pages 180-191
    2. Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption

      • Xinyu Feng, Cong Li, Dan Li, Yuejian Fang, Qingni Shen
      Pages 192-204
    3. Identity-Based Group Encryption Revisited

      • Kanika Gupta, S. Sharmila Deva Selvi, C. Pandu Rangan, Shubham Sopan Dighe
      Pages 205-209
    4. Compact Hierarchical IBE from Lattices in the Standard Model

      • Daode Zhang, Fuyang Fang, Bao Li, Haiyang Xue, Bei Liang
      Pages 210-221
  2. Attacks and Attacks Defense

    1. Front Matter

      Pages 223-223
    2. Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks

      • Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendoerfer
      Pages 225-235
    3. A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys

      • Soyoung Ahn, Hyang-Sook Lee, Seongan Lim, Ikkwon Yie
      Pages 248-254
    4. Practical Range Proof for Cryptocurrency Monero with Provable Security

      • Kang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu
      Pages 255-262
  3. Wireless Sensor Network Security

    1. Front Matter

      Pages 263-263
    2. Modeling Key Infection in Large-Scale Sensor Networks

      • Feiyang Peng, Zhihong Liu, Yong Zeng, Jialei Wang
      Pages 265-275
    3. SDN-Based Secure Localization in Heterogeneous WSN

      • Meigen Huang, Bin Yu
      Pages 276-287
  4. Security Applications

    1. Front Matter

      Pages 289-289
    2. A PUF and Software Collaborative Key Protection Scheme

      • Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma, Liang Zheng
      Pages 291-303
    3. Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions

      • Xueping Liang, Sachin Shetty, Deepak Tosh, Peter Foytik, Lingchen Zhang
      Pages 304-310
  5. Malicious Code Defense and Mobile Security

    1. Front Matter

      Pages 311-311
    2. A Self-healing Key Distribution Scheme for Mobile Ad Hoc Networks

      • Guangli Xiang, Lu Yu, Beilei Li, Mengsen Xia
      Pages 325-335
  6. IoT Security

    1. Front Matter

      Pages 337-337

Other Volumes

  1. Information and Communications Security

About this book

This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.

The 43 revised full papers and 14 short papers presented were carefully selected from 188 submissions. The papers cover topics such as Formal Analysis and Randomness Test; Signature Scheme and Key Management; Algorithms; Applied Cryptography; Attacks and Attacks Defense; Wireless Sensor Network Security; Security Applications; Malicious Code Defense and Mobile Security; IoT Security; Healthcare and Industrial Control System Security; Privacy Protection; Engineering Issues of Crypto; Cloud and E-commerce Security; Security Protocols; Network Security. 

Editors and Affiliations

  • Chinese Academy of Sciences and Peking University, Beijing, China

    Sihan Qing

  • Royal Holloway, University of London, Egham, United Kingdom

    Chris Mitchell

  • University of Surrey, Guildford, United Kingdom

    Liqun Chen

  • Microsoft, Beijing, China

    Dongmei Liu

Bibliographic Information

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access