Skip to main content
Book cover

Information and Communications Security

20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings

  • Conference proceedings
  • © 2018

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11149)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: ICICS 2018.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (50 papers)

  1. Full Paper Session I: Blockchain Technology

  2. Full Paper Session II: Malware, Botnet and Network Security

  3. Full Paper Session III: Real-World Cryptography

  4. Full Paper Session IV: Encrypted Computing

  5. Full Paper Session V: Privacy Protection

Other volumes

  1. Information and Communications Security

Keywords

About this book

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018.

The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

Editors and Affiliations

  • Départment d'Informatique, Ecole Normale Supérieure, Paris, France

    David Naccache

  • University of Texas, San Antonio, USA

    Shouhuai Xu

  • Chinese Academy of Sciences, Beijing, China

    Sihan Qing

  • Dipto di Informatica, Univ degli Studi di Milano, Crema, Italy

    Pierangela Samarati

  • Télécom SudParis, Evry, France

    Gregory Blanc

  • University of New Brunswick, Fredericton, Canada

    Rongxing Lu

  • IMT Lille Douai, Villeneuve-d'Ascq, France

    Zonghua Zhang, Ahmed Meddahi

Bibliographic Information

Publish with us