Skip to main content
  • Conference proceedings
  • © 2013

Information and Communications Security

15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings

  • Fast track conference proceedings
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8233)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

  2. Web Security and Worm Detection

    1. Rating Web Pages Using Page-Transition Evidence

      • Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang
      Pages 49-58
    2. OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks

      • Liang He, Dengguo Feng, Purui Su, Lingyun Ying, Yi Yang, Huafeng Huang et al.
      Pages 59-74
  3. Cloud Storage Security

    1. A Secure and Efficient Scheme for Cloud Storage against Eavesdropper

      • Jian Liu, Huimei Wang, Ming Xian, Kun Huang
      Pages 75-89
    2. Secure and Private Outsourcing of Shape-Based Feature Extraction

      • Shumiao Wang, Mohamed Nassar, Mikhail Atallah, Qutaibah Malluhi
      Pages 90-99
  4. Virtualization for Cloud Computing

    1. Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures

      • Hong Rong, Ming Xian, Huimei Wang, Jiangyong Shi
      Pages 100-112
    2. Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks

      • Smitha Sundareswaran, Anna C. Squcciarini
      Pages 113-124
    3. A Covert Channel Using Event Channel State on Xen Hypervisor

      • Qingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang, Sihan Qing, Zhonghai Wu
      Pages 125-134
  5. Trusted and Trustworthy Computing

    1. Type-Based Analysis of Protected Storage in the TPM

      • Jianxiong Shao, Dengguo Feng, Yu Qin
      Pages 135-150
    2. Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators

      • Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
      Pages 151-166
  6. Authentication and Security Protocols

    1. Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model

      • Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou
      Pages 167-184
  7. Intrusion Detection and Recovery

    1. PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks

      • Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis
      Pages 213-228
    2. Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels

      • Jing Wang, Peng Liu, Limin Liu, Le Guan, Jiwu Jing
      Pages 229-244

Other Volumes

  1. Information and Communications Security

About this book

This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering issues of crypto, cryptanalysis, attribute-based encryption, and cryptographic primitives and applications.

Editors and Affiliations

  • Institute of Software, Chinese Academy of Sciences, Beijing, China

    Sihan Qing, Dongmei Liu

  • Institute for Infocomm Research, Infocom Security Department, Singapore, Singapore

    Jianying Zhou

Bibliographic Information

  • Book Title: Information and Communications Security

  • Book Subtitle: 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013, Proceedings

  • Editors: Sihan Qing, Jianying Zhou, Dongmei Liu

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-02726-5

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2013

  • Softcover ISBN: 978-3-319-02725-8Published: 16 October 2013

  • eBook ISBN: 978-3-319-02726-5Published: 30 October 2013

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 414

  • Number of Illustrations: 94 b/w illustrations

  • Topics: Cryptology, Systems and Data Security, Algorithm Analysis and Problem Complexity

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access