Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected...
        Saved in:
      
    
          | Main Authors | , | 
|---|---|
| Format | eBook Book | 
| Language | English | 
| Published | 
        Cham
          Springer Nature
    
        2015
     Springer Springer International Publishing AG  | 
| Edition | 1 | 
| Series | LNCS sublibrary. SL 4, Security and cryptology | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 3319219669 9783319219660 3319219650 9783319219653  | 
Cover
| Abstract | This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applications in the field of information security and cryptology. | 
    
|---|---|
| AbstractList | This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applications in the field of information security and cryptology. | 
    
| Author | International Conference on Information and Communications Security Hui, Lucas Chi-Kwong  | 
    
| Author_xml | – sequence: 1 fullname: International Conference on Information and Communications Security – sequence: 2 fullname: Hui, Lucas Chi-Kwong  | 
    
| BackLink | https://cir.nii.ac.jp/crid/1130282269717543936$$DView record in CiNii | 
    
| BookMark | eNpNz01LAzEQBuCIH9jW_ociQvFQSCbfR12qFgoeFK8hm83atbtJ3WwV_71rV8TLDDM8vMOM0UmIwR-hMaVEA9FC6OP_wxkaacI1UxToOZqm9IYxJpwrzukIzVehjG1juyqGmQ3FLItNsw-VO2zS7Mm7fVt1XxfotLR18tPfPkEvd8vn7GGxfrxfZTfrhaV9rF4wBTm2JS1z0EoyprgHCYqDEkqXynHIFWBvwQuHi7wkjhQCS-GoJYphSSfoegi2aes_0ybWXTIftc9j3Cajpfr7DPd2PthdG9_3PnXmwJwPXWtrs7zNOJf9ddXLq0GGqjKu-qmEUAwKQGhJJGdUU9Gzy4E5m2zdM9PEEF9bu9skwxkBSjj9BmfZZhY | 
    
| ContentType | eBook Book  | 
    
| DBID | I4C RYH  | 
    
| DEWEY | 005 | 
    
| DatabaseName | Casalini Torrossa eBooks Institutional Catalogue CiNii Complete  | 
    
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Computer Science Mathematics  | 
    
| EISBN | 3319219669 9783319219660  | 
    
| Edition | 1 1st ed. 2015  | 
    
| Editor | Qing, S. H Shi, Elaine Hui, Lucas C. K Yiu, S. M  | 
    
| Editor_xml | – sequence: 1 fullname: Hui, Lucas C. K – sequence: 2 fullname: Qing, S. H – sequence: 3 fullname: Shi, Elaine – sequence: 4 fullname: Yiu, S. M  | 
    
| ExternalDocumentID | 9783319219660 EBC5577288 BB20644925 5412315  | 
    
| GroupedDBID | 0D6 0DA 38. AABBV AAGZE AAZAK AAZUS ABBVZ ABFTD ABMNI ACKNT ACRRC AEDXK AEKFX AETDV AEZAY ALMA_UNASSIGNED_HOLDINGS APFYR AZZ BBABE CZZ I4C IEZ IY- LDH NUC SAO SBO SFQCF TMQGW TPJZQ TSXQS TWXRB Z7R Z7X Z7Z Z81 Z83 Z84 Z88 AEJLV RYH Z7U  | 
    
| ID | FETCH-LOGICAL-a30009-482b0af3fb29874485e2728528689f8c52b820ea2e6c0dbf1c1d6076c3a184073 | 
    
| ISBN | 3319219669 9783319219660 3319219650 9783319219653  | 
    
| IngestDate | Fri Nov 08 04:07:56 EST 2024 Mon May 05 07:12:39 EDT 2025 Thu Jun 26 22:47:51 EDT 2025 Tue Nov 14 22:47:09 EST 2023  | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| LCCallNum_Ident | Q | 
    
| Language | English | 
    
| LinkModel | OpenURL | 
    
| MergedId | FETCHMERGED-LOGICAL-a30009-482b0af3fb29874485e2728528689f8c52b820ea2e6c0dbf1c1d6076c3a184073 | 
    
| Notes | Includes bibliographical references and index | 
    
| OCLC | 915948323 | 
    
| PQID | EBC5577288 | 
    
| PageCount | 331 | 
    
| ParticipantIDs | askewsholts_vlebooks_9783319219660 proquest_ebookcentral_EBC5577288 nii_cinii_1130282269717543936 casalini_monographs_5412315  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2015 c2015 2015-08-01  | 
    
| PublicationDateYYYYMMDD | 2015-01-01 2015-08-01  | 
    
| PublicationDate_xml | – year: 2015 text: 2015  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | Cham | 
    
| PublicationPlace_xml | – name: Netherlands – name: Cham  | 
    
| PublicationSeriesTitle | LNCS sublibrary. SL 4, Security and cryptology | 
    
| PublicationYear | 2015 | 
    
| Publisher | Springer Nature Springer Springer International Publishing AG  | 
    
| Publisher_xml | – name: Springer Nature – name: Springer – name: Springer International Publishing AG  | 
    
| SSID | ssj0001558553 | 
    
| Score | 1.951571 | 
    
| Snippet | This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security,... | 
    
| SourceID | askewsholts proquest nii casalini  | 
    
| SourceType | Aggregation Database Publisher  | 
    
| SubjectTerms | Computer networks-Security measures-Congresses Computer programming, programs, data Computer security Computer security -- Congresses Telecommunication systems Telecommunication systems -- Congresses  | 
    
| Subtitle | 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers | 
    
| TableOfContents | Intro -- Preface -- Organization -- Contents -- Error-Tolerant Algebraic Side-Channel Attacks Using BEE -- 1 Introduction -- 2 Algebraic Side-Channel Attacks Using BEE -- 2.1 Building an Equation System -- 2.2 Extracting Side-Channel Information -- 2.3 Solving the System of Equations and Noisy Side-Channel Information with BEE -- 3 Algebraic Side-Channel Attacks Under the Hamming Weight Leakage Model -- 3.1 PRESENT-80 -- 3.2 AES-128 -- 4 Cold Boot Attacks and Other Applications -- 4.1 Cold Boot Attacks Against AES-128 -- 4.2 Side-Channel Cube Attacks -- 5 Discussion -- 6 Conclusion -- A Equations of the S-Box in PRESENT -- B Algebraic Side-Channel Attack of SIMON-32 Under Hamming Distance Leakage Model -- C Running Time of Cold Boot Attack against AES-128 -- References -- SEDB: Building Secure Database Services for Sensitive Data -- 1 Introduction -- 2 System Overview -- 3 The Protocol -- 3.1 Query Processing -- 3.2 Discussions -- 4 Security Analysis -- 5 Performance Evaluation -- 6 Related Works -- 7 Conclusion -- A Appendix -- References -- Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Outline -- 2 Background -- 2.1 ARM TrustZone -- 2.2 Physical Unclonable Functions and Fuzzy Extractors -- 3 Objectives and Threat Model -- 3.1 Objectives -- 3.2 Threat Model -- 4 Design -- 4.1 Mdaak Primitives -- 4.2 Mdaak Components -- 4.3 Storage Support -- 4.4 Security Analysis -- 5 Implementation -- 5.1 Hardware Testbed -- 5.2 Software Implementation -- 6 Evaluation -- 6.1 Curve Parameters -- 6.2 Code Size -- 6.3 Performance -- 6.4 Suggestions -- 7 Related Work -- 8 Conclusion -- References -- Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks -- 1 Introduction -- 1.1 Contributions -- 2 Preliminaries -- 2.1 Elliptic Curve Cryptography 3.2 Generation of Search Set and Displaying an Instance A Single-Challenge Security Implies Multi-challenge Security -- B Justification of the Truncated q-RW Assumption -- References -- Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation -- Abstract -- 1 Introduction -- 2 Analyzing Display Electromagnetic Radiation Signal Properties -- 3 Evalution Algorithm -- 4 Experimental Results -- 5 Conclusion -- Acknowledgment -- References -- How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice? -- 1 Introduction -- 1.1 Contributions -- 2 Preliminaries -- 2.1 CPA -- 2.2 MIA -- 2.3 KSA -- 2.4 Sosd and Sost -- 3 Evaluation Framework -- 3.1 Metrics -- 3.2 Factors -- 4 Experimental Evaluation -- 4.1 Simulated Experiments -- 4.2 Practical Experiments. -- 4.3 Experimental Observations -- 5 Conclusions -- References -- Attribute Based Key-Insulated Signatures with Message Recovery -- 1 Introduction -- 1.1 Our Contribution -- 2 Preliminaries -- 2.1 ABKIS with Message Recovery Template -- 2.2 Security Definitions for ABKIS with Message Recovery -- 3 Proposed ABKIS with Message Recovery -- 3.1 ABKIS Scheme with Message Recovery for Small Universe -- 3.2 Large Universe ABKIS Scheme with Message Recovery -- 3.3 Security Proof of SU-ABKIS and LU-ABKIS -- 4 Some Possible Extensions -- 5 Conclusion -- References -- XOR Based Non-monotone t-(k,n)*-Visual Cryptographic Schemes Using Linear Algebra -- 1 Introduction -- 1.1 An Alternative for ``OR'' Based VCS -- 1.2 Our Contribution -- 2 The Model and Construction for t-(k,n)*-NM-XVCS -- 2.1 The Construction -- 3 On the Contrast of t-(k,n)*-NM-XVCS: Achieving Optimal Relative Contrast -- 3.1 (k-1)-(k,n)*-NM-XVCS -- 3.2 (n,n)-XVCS -- 4 Reducing Pixel Expansion -- 5 Achieving Optimality for both Pixel Expansion and Relative Contrast -- 6 Conclusion -- References A Visual One-Time Password Authentication Scheme Using Mobile Devices -- 1 Introduction -- 2 Related Work -- 2.1 Visual Authentication -- 2.2 Authentication Using a Personal Device -- 2.3 One-Time Passwords -- 3 Model and Definition of the Visual One-Time Password Authentication System -- 4 Proposed Visual OTP Scheme -- 4.1 Design -- 4.2 Practical Issues -- 5 Discussion -- 5.1 Advantages of the Visual OTP Scheme -- 5.2 Limitations -- 6 Conclusion -- References -- Secure and Efficient Scheme for Delegation of Signing Rights -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 1.3 Outline of the Paper -- 2 Preliminaries -- 3 IBMPS Scheme and Its Security -- 3.1 Definition of IBMPS Scheme -- 3.2 Security Model for IBMPS Scheme -- 4 Proposed Scheme -- 4.1 Setup -- 4.2 Extraction -- 4.3 Proxy Key Generation -- 4.4 Multi-proxy Signature -- 4.5 Multi-proxy Verification -- 5 Correctness and Security Proof -- 5.1 Proof of Correctness of Our IBMPS Scheme -- 5.2 Proof of Security of Our IBMPS Scheme -- 6 Efficiency Comparison -- References -- Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator -- 1 Introduction -- 1.1 Our Approach -- 1.2 Related Work -- 2 Preliminaries -- 2.1 Bilinear Maps -- 2.2 Decisional Parallel BDHE Assumption -- 2.3 Linear Secret Sharing Schemes -- 3 Definition of CP-ABE with SEM -- 3.1 Fully-RCCA-CCA Security Model for CP-ABE with SEM -- 4 Our Construction of CP-ABE with SEM -- 4.1 Security Proof -- 5 Conclusion and Discussion -- References -- MOVTCHA: A CAPTCHA Based on Human Cognitive and Behavioral Features Analysis -- 1 Introduction -- 2 The Cognitive Task as MOVTCHA -- 2.1 Design and Execution of Movtcha -- 2.2 Cognitive and Behavioral Feature Extraction -- 2.3 Telling Computers and Humans Apart -- 3 Nuts and Bolts of Our System -- 3.1 Selecting Images to Be Tailored 2.2 Android and TrustStore -- 3 Attack Scenario -- 3.1 Self-signed Certificate -- 3.2 Installed Malicious Root CA-signed Certificate -- 4 TagDroid -- 4.1 Overview -- 4.2 ValMod -- 4.3 PeerVerify -- 5 Evaluation -- 5.1 Effectiveness -- 5.2 Performance -- 6 Related Work -- 7 Conclusion -- References -- A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter -- 1 Introduction -- 2 Preliminaries -- 3 1-st Minimum Algebraic Immunity AImin(f) -- 4 A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers via Our Theoretical Results -- 5 Application of Our Method on a LFSR-Based Stream Cipher Overlooking Our Criterion -- 6 Conclusion -- References -- A Private Lookup Protocol with Low Online Complexity for Secure Multiparty Computation -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Protocol for Private Lookup -- 4.1 Speeding Up the Offline Phase -- 4.2 Speeding Up the Vector-Only Phase -- 5 Protocol for DFA Execution -- 6 Protocol for SSSD -- 7 Conclusions -- References -- Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors -- 1 Introduction -- 2 Multiplication Techniques -- 2.1 Operand Scanning Method -- 2.2 Product Scanning Method -- 2.3 Hybrid Method -- 2.4 Operand Caching Method -- 2.5 Karatsuba Multiplication -- 3 Our Implementation -- 3.1 Loop Structure -- 3.2 Inner-Loop Operation -- 4 Performance Evaluation and Comparison -- 5 Conclusions -- References -- New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security -- 1 Introduction -- 1.1 Background -- 1.2 Our Contribution -- 2 Definition of Identity-Based Encryption -- 2.1 Syntax -- 2.2 Security -- 3 Number Theoretic Assumptions -- 3.1 Definition of Assumptions -- 3.2 Relationship Between Assumptions -- 4 New Security Proof for the Boneh-Boyen IBE Scheme -- 5 Discussion 2.2 The X86-64 CPU Architecture -- 3 System Design and Implementation -- 3.1 System Overview -- 3.2 Implementation of Secure Scalar Multiplication in ECC -- 3.3 Deployment of ECC Cryptosystem in the Operating System -- 4 Evaluation and Discussion -- 4.1 Security Verification -- 4.2 Performance -- 5 Conclusion and Future Work -- References -- 4P_VES: A Collusion-Resistant Accountable Virtual Economy System -- 1 Introduction -- 2 System Model -- 3 Preliminaries -- 3.1 Commitment -- 3.2 Dynamic Accumulator -- 3.3 Cryptographic Assumptions -- 4 Scheme Construction -- 5 Property Analysis -- 6 Performance Evaluation -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Privacy-Preserving Distance-Bounding Proof-of-Knowledge -- 1 Introduction -- 2 Background -- 2.1 Distance-Bounding Proof-of-Knowledge (DBPK-Log) -- 2.2 BBS+ Signature Scheme [6] -- 3 Model -- 4 PDB Construction -- 5 Conclusion -- References -- Distance Lower Bounding -- 1 Introduction -- 2 DLB - Model and Impossibilities -- 2.1 Attacks on DLB Protocols -- 2.2 Impossibility Results -- 2.3 Restricted DF, MiM, and CF -- 3 DLB Protocol Constructions -- 3.1 The Protocol DLB-BM -- 3.2 The Design of Erasure Sequence and Its Response -- 4 Security Analysis of DLB-BM -- 5 Practical Consideration -- 6 Concluding Remarks -- A Proof Sketch of Theorem 1 -- B Proof of Theorem 2 -- References -- Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC Framework -- 1 Introduction -- 2 Preliminaries -- 2.1 Bilinear Pairing and Mathematical Assumptions -- 2.2 Non-Interactive Verification of Pairing Product Equation [16] -- 3 Security Model of OTNk 1 -- 4 The Protocol -- 5 Security Analysis -- 6 Comparison -- References -- TagDroid: Hybrid SSL Certificate Verification in Android -- 1 Introduction -- 2 Background -- 2.1 Android and SSL Certificate Verification  | 
    
| Title | Information and Communications Security | 
    
| URI | http://digital.casalini.it/9783319219660 https://cir.nii.ac.jp/crid/1130282269717543936 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5577288 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783319219660  | 
    
| Volume | 8958 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Nb9QwELXocqEXypdY2qIR4tYE5cuOlxsbLSotcGmpeotsN6uuQNsKB5D6P_p_mXHszW4AIbhEWSuajf0c-43tmcfYS_R0hCmMiE2KvkmRaB1rhV6rKJEcYDkXTg7ow0dx-Kk4OufnQWDcR5e0-pW5-W1cyf-gimWIK0XJ_gOyK6NYgPeIL14RYbwOyO_qZzh4vgo6DIFpfZiHPbBelK7z90V7OVj468P83BBRvatODnCKLtw8ROJDx_6grlPX7oYl05B0CFqLKWNS5Z539umcsEXaap2iDt5cq-um3yP60z_TLsWwGtVmNU58Nfqu14Vyk04bvVp8_OPKT7x-3SLlg3WLsG654c_mOaVnm4guf_AgEfZ0miF_omSKW2yrLNHTvvtmdvT-rF9S4-j7cFLuWNnxWb16u9tsW9nPOH_g3NJaIiPKKopBRW6xXCx-mZEdzTjdYSMKPXnA7jTLh-x-ENwAP_4-YrdrDQbYYLCJOwTc4TUQ6rDR9tC3fQQOcyAMIyDEgRCPwOEdQUAbHNqRew5teqQhIA0d0o_Z2dvZaXUYe12NWOWJUxWUmU7UPJ_rbELyB5I3WZlJnkkhJ3NpeKaRGDYqa4RJLvQ8NemFSPCjzhUtCJT5EzZaXi2bpwxKnjW8EAWlvStSJTW6oEZxw6WWOPSnY_Zirb3r71_cGQBbr4EikjHbDTDU-Il2udptzQukVSkfs31EpjYLuqa00Y6kVkxKJL7IpnMxZhAwq511f6y5nk0rztF7lPLZX0zssnt9F91jo_brt2YfyWarn_tO9hM5o3ZB | 
    
| linkProvider | Library Specific Holdings | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Information+and+communications+security+%3A+16th+International+Conference%2C+ICICS+2014%2C+Hong+Kong%2C+China%2C+December+16-17%2C+2014+%3A+revised+selected+papers&rft.au=International+Conference+on+Information+and+Communications+Security&rft.au=Hui%2C+Lucas+Chi-Kwong&rft.date=2015-01-01&rft.pub=Springer&rft.isbn=9783319219653&rft.externalDocID=BB20644925 | 
    
| thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97833192%2F9783319219660.jpg |