000 06522nam a22006735i 4500
001 978-3-642-34129-8
003 DE-He213
005 20240730193310.0
007 cr nn 008mamaa
008 121026s2012 gw | s |||| 0|eng d
020 _a9783642341298
_9978-3-642-34129-8
024 7 _a10.1007/978-3-642-34129-8
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aInformation and Communications Security
_h[electronic resource] :
_b14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings /
_cedited by Tat Wing Chim, Tsz Hon Yuen.
250 _a1st ed. 2012.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2012.
300 _aXVI, 506 p. 120 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v7618
505 0 _aAudio Steganalysis Based on Lossless Data-Compression Techniques -- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme -- Impact of the Revocation Service in PKI Prices -- Cryptanalysis of Multi-Prime RSA with Small Prime Difference -- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem -- Improved Related-Key Differential Attacks on Reduced-Round LBlock -- Countermeasures on Application Level Low-Rate Denial-of-Service Attack -- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test -- Group Behavior Metrics for P2P Botnet Detection -- Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA -- Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model -- Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain -- Perfect Ambiguous Optimistic Fair Exchange -- Privacy-Preserving Noisy Keyword Search in Cloud Computing -- Forward Secure Attribute-Based Signatures -- On Constant-Round Precise Zero-Knowledge -- Outsourcing Encryption of Attribute-Based Encryption with MapReduce -- Security Enhancement of Identity-Based Identification with Reversibility -- Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture -- Permission-Based Abnormal Application Detection for Android -- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data -- Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- A Generic Approach for Providing Revocation Support in Secret Handshake -- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy -- Exploring Mobile Proxies for Better Password Authentication --  On Security of Universal Hash Function Based Multiple Authentication -- A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack -- Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack -- Comparison between Side-Channel Analysis Distinguishers -- Acceleration of Composite Order Bilinear Pairing on Graphics Hardware -- Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme -- Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition -- Cookie-Proxy: A Scheme to Prevent SSLStrip Attack -- Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer -- Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding -- Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance -- A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains -- Efficient Attribute Proofs in Anonymous Credential Using Attribute-Based Cryptography -- F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances -- Location Privacy Policy Management System.-Privacy Protection in Social Networks Using l-Diversity -- Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner -- A Key Sharing Fuzzy Vault Scheme -- A New Version of McEliece PKC Based on Convolutional Codes -- Flexible Attribute-Based Encryption -- Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles -- A Comparative Study of Malware Family Classification -- A Fine-Grained Classification Approach for the Packed Malicious Code.
520 _aThis book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 0 _aCoding theory.
_94154
650 0 _aData protection.
_97245
650 0 _aAlgorithms.
_93390
650 0 _aComputer networks .
_931572
650 1 4 _aCryptology.
_931769
650 2 4 _aData Structures and Information Theory.
_931923
650 2 4 _aCoding and Information Theory.
_9153187
650 2 4 _aData and Information Security.
_931990
650 2 4 _aAlgorithms.
_93390
650 2 4 _aComputer Communication Networks.
_9153188
700 1 _aChim, Tat Wing.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9153189
700 1 _aYuen, Tsz Hon.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9153190
710 2 _aSpringerLink (Online service)
_9153191
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642341281
776 0 8 _iPrinted edition:
_z9783642341304
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v7618
_9153192
856 4 0 _uhttps://doi.org/10.1007/978-3-642-34129-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c94690
_d94690