Skip to main content
  • Conference proceedings
  • © 2016

Information and Communications Security

17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9543)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICICS: International Conference on Information and Communications Security

Conference proceedings info: ICICS 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (41 papers)

  1. Front Matter

    Pages I-XVIII
  2. Ensuring Kernel Integrity Using KIPBMFH

    • Zhifeng Chen, Qingbao Li, Songhui Guo, Ye Wang
    Pages 10-17
  3. Secret Key Extraction with Quantization Randomness Using Hadamard Matrix on QuaDRiGa Channel

    • Xuanxuan Wang, Lihuan Jiang, Lars Thiele, Yongming Wang
    Pages 50-61
  4. Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm

    • Weiqiong Cao, Jingyi Feng, Shaofeng Zhu, Hua Chen, Wenling Wu, Xucang Han et al.
    Pages 62-70
  5. How to Vote Privately Using Bitcoin

    • Zhichao Zhao, T.-H. Hubert Chan
    Pages 82-96
  6. Multidimensional Zero-Correlation Linear Cryptanalysis on 23-Round LBlock-s

    • Hong Xu, Ping Jia, Geshi Huang, Xuejia Lai
    Pages 97-108
  7. A Novel Post-processing Method to Improve the Ability of Reconstruction for Video Leaking Signal

    • Xuejie Ding, Meng Zhang, Jun Shi, Weiqing Huang
    Pages 141-151
  8. TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems

    • Bo Yang, Yu Qin, Yingjun Zhang, Weijin Wang, Dengguo Feng
    Pages 152-168
  9. QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations

    • Chenyang Tu, Jian Zhou, Neng Gao, Zeyi Liu, Yuan Ma, Zongbin Liu
    Pages 184-198
  10. Strategy of Relations Collection in Factoring RSA Modulus

    • Haibo Yu, Guoqiang Bai
    Pages 199-211
  11. A Multivariate Encryption Scheme with Rainbow

    • Takanori Yasuda, Kouichi Sakurai
    Pages 236-251

Other Volumes

  1. Information and Communications Security

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015.


The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions. The papers provide the latest results in research and development in the field of information security and applied cryptology.


Editors and Affiliations

  • Institute of Information Engineering, Chinese Academy of Science, Beijing, China

    Sihan Qing

  • Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan

    Eiji Okamoto

  • School of Computing, KAIST, Daejeon, Korea (Republic of)

    Kwangjo Kim

  • Westone Corporation, Beijing, China

    Dongmei Liu

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access