Skip to main content
  • Conference proceedings
  • © 2012

Information and Communications Security

14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7618)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (49 papers)

  1. Front Matter

  2. Full Papers

    1. Applied Cryptography

      1. Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme
        • Yang-Wai Chow, Willy Susilo, Duncan S. Wong
        Pages 10-21
      2. Impact of the Revocation Service in PKI Prices
        • Carlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, Juanjo Alins
        Pages 22-32
    2. Cryptanalysis

      1. Cryptanalysis of Multi-Prime RSA with Small Prime Difference
        • Hatem M. Bahig, Ashraf Bhery, Dieaa I. Nassr
        Pages 33-44
      2. Improved Related-Key Differential Attacks on Reduced-Round LBlock
        • Shusheng Liu, Zheng Gong, Libin Wang
        Pages 58-69
    3. Network Security

      1. Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test
        • Zouheir Trabelsi, Liren Zhang, Safaa Zeidan
        Pages 81-92
      2. Group Behavior Metrics for P2P Botnet Detection
        • John Felix, Charles Joseph, Ali A. Ghorbani
        Pages 93-104
    4. Optimization

      1. Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA
        • Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, Xingjie Yu
        Pages 105-118
    5. Privacy

      1. Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model
        • Hao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu Ming Yiu, Sihan Qing
        Pages 119-130
      2. Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain
        • Wilko Henecka, Nigel Bean, Matthew Roughan
        Pages 131-141
      3. Perfect Ambiguous Optimistic Fair Exchange
        • Yang Wang, Man Ho Au, Willy Susilo
        Pages 142-153
      4. Privacy-Preserving Noisy Keyword Search in Cloud Computing
        • Xiaoqiong Pang, Bo Yang, Qiong Huang
        Pages 154-166
    6. Protocols

      1. Forward Secure Attribute-Based Signatures
        • Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou
        Pages 167-177
      2. On Constant-Round Precise Zero-Knowledge
        • Ning Ding, Dawu Gu
        Pages 178-190
      3. Outsourcing Encryption of Attribute-Based Encryption with MapReduce
        • Jingwei Li, Chunfu Jia, Jin Li, Xiaofeng Chen
        Pages 191-201
      4. Security Enhancement of Identity-Based Identification with Reversibility
        • Atsushi Fujioka, Taiichi Saito, Keita Xagawa
        Pages 202-213
    7. Security in Mobile Systems

      1. Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture
        • Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
        Pages 214-227

Other Volumes

  1. Information and Communications Security

About this book

This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.

Editors and Affiliations

  • Department of Computer Science, The University of Hong Kong, Hong Kong, China

    Tat Wing Chim, Tsz Hon Yuen

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access