Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected...

Full description

Saved in:
Bibliographic Details
Main Authors International Conference on Information and Communications Security, Hui, Lucas Chi-Kwong
Format eBook Book
LanguageEnglish
Published Cham Springer Nature 2015
Springer
Springer International Publishing AG
Edition1
SeriesLNCS sublibrary. SL 4, Security and cryptology
Subjects
Online AccessGet full text
ISBN3319219669
9783319219660
3319219650
9783319219653

Cover

Abstract This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applications in the field of information security and cryptology.
AbstractList This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applications in the field of information security and cryptology.
Author International Conference on Information and Communications Security
Hui, Lucas Chi-Kwong
Author_xml – sequence: 1
  fullname: International Conference on Information and Communications Security
– sequence: 2
  fullname: Hui, Lucas Chi-Kwong
BackLink https://cir.nii.ac.jp/crid/1130282269717543936$$DView record in CiNii
BookMark eNpNz01LAzEQBuCIH9jW_ociQvFQSCbfR12qFgoeFK8hm83atbtJ3WwV_71rV8TLDDM8vMOM0UmIwR-hMaVEA9FC6OP_wxkaacI1UxToOZqm9IYxJpwrzukIzVehjG1juyqGmQ3FLItNsw-VO2zS7Mm7fVt1XxfotLR18tPfPkEvd8vn7GGxfrxfZTfrhaV9rF4wBTm2JS1z0EoyprgHCYqDEkqXynHIFWBvwQuHi7wkjhQCS-GoJYphSSfoegi2aes_0ybWXTIftc9j3Cajpfr7DPd2PthdG9_3PnXmwJwPXWtrs7zNOJf9ddXLq0GGqjKu-qmEUAwKQGhJJGdUU9Gzy4E5m2zdM9PEEF9bu9skwxkBSjj9BmfZZhY
ContentType eBook
Book
DBID I4C
RYH
DEWEY 005
DatabaseName Casalini Torrossa eBooks Institutional Catalogue
CiNii Complete
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Mathematics
EISBN 3319219669
9783319219660
Edition 1
1st ed. 2015
Editor Qing, S. H
Shi, Elaine
Hui, Lucas C. K
Yiu, S. M
Editor_xml – sequence: 1
  fullname: Hui, Lucas C. K
– sequence: 2
  fullname: Qing, S. H
– sequence: 3
  fullname: Shi, Elaine
– sequence: 4
  fullname: Yiu, S. M
ExternalDocumentID 9783319219660
EBC5577288
BB20644925
5412315
GroupedDBID 0D6
0DA
38.
AABBV
AAGZE
AAZAK
AAZUS
ABBVZ
ABFTD
ABMNI
ACKNT
ACRRC
AEDXK
AEKFX
AETDV
AEZAY
ALMA_UNASSIGNED_HOLDINGS
APFYR
AZZ
BBABE
CZZ
I4C
IEZ
IY-
LDH
NUC
SAO
SBO
SFQCF
TMQGW
TPJZQ
TSXQS
TWXRB
Z7R
Z7X
Z7Z
Z81
Z83
Z84
Z88
AEJLV
RYH
Z7U
ID FETCH-LOGICAL-a30009-482b0af3fb29874485e2728528689f8c52b820ea2e6c0dbf1c1d6076c3a184073
ISBN 3319219669
9783319219660
3319219650
9783319219653
IngestDate Fri Nov 08 04:07:56 EST 2024
Mon May 05 07:12:39 EDT 2025
Thu Jun 26 22:47:51 EDT 2025
Tue Nov 14 22:47:09 EST 2023
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident Q
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a30009-482b0af3fb29874485e2728528689f8c52b820ea2e6c0dbf1c1d6076c3a184073
Notes Includes bibliographical references and index
OCLC 915948323
PQID EBC5577288
PageCount 331
ParticipantIDs askewsholts_vlebooks_9783319219660
proquest_ebookcentral_EBC5577288
nii_cinii_1130282269717543936
casalini_monographs_5412315
PublicationCentury 2000
PublicationDate 2015
c2015
2015-08-01
PublicationDateYYYYMMDD 2015-01-01
2015-08-01
PublicationDate_xml – year: 2015
  text: 2015
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Netherlands
– name: Cham
PublicationSeriesTitle LNCS sublibrary. SL 4, Security and cryptology
PublicationYear 2015
Publisher Springer Nature
Springer
Springer International Publishing AG
Publisher_xml – name: Springer Nature
– name: Springer
– name: Springer International Publishing AG
SSID ssj0001558553
Score 1.951571
Snippet This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security,...
SourceID askewsholts
proquest
nii
casalini
SourceType Aggregation Database
Publisher
SubjectTerms Computer networks-Security measures-Congresses
Computer programming, programs, data
Computer security
Computer security -- Congresses
Telecommunication systems
Telecommunication systems -- Congresses
Subtitle 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
TableOfContents Intro -- Preface -- Organization -- Contents -- Error-Tolerant Algebraic Side-Channel Attacks Using BEE -- 1 Introduction -- 2 Algebraic Side-Channel Attacks Using BEE -- 2.1 Building an Equation System -- 2.2 Extracting Side-Channel Information -- 2.3 Solving the System of Equations and Noisy Side-Channel Information with BEE -- 3 Algebraic Side-Channel Attacks Under the Hamming Weight Leakage Model -- 3.1 PRESENT-80 -- 3.2 AES-128 -- 4 Cold Boot Attacks and Other Applications -- 4.1 Cold Boot Attacks Against AES-128 -- 4.2 Side-Channel Cube Attacks -- 5 Discussion -- 6 Conclusion -- A Equations of the S-Box in PRESENT -- B Algebraic Side-Channel Attack of SIMON-32 Under Hamming Distance Leakage Model -- C Running Time of Cold Boot Attack against AES-128 -- References -- SEDB: Building Secure Database Services for Sensitive Data -- 1 Introduction -- 2 System Overview -- 3 The Protocol -- 3.1 Query Processing -- 3.2 Discussions -- 4 Security Analysis -- 5 Performance Evaluation -- 6 Related Works -- 7 Conclusion -- A Appendix -- References -- Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Outline -- 2 Background -- 2.1 ARM TrustZone -- 2.2 Physical Unclonable Functions and Fuzzy Extractors -- 3 Objectives and Threat Model -- 3.1 Objectives -- 3.2 Threat Model -- 4 Design -- 4.1 Mdaak Primitives -- 4.2 Mdaak Components -- 4.3 Storage Support -- 4.4 Security Analysis -- 5 Implementation -- 5.1 Hardware Testbed -- 5.2 Software Implementation -- 6 Evaluation -- 6.1 Curve Parameters -- 6.2 Code Size -- 6.3 Performance -- 6.4 Suggestions -- 7 Related Work -- 8 Conclusion -- References -- Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks -- 1 Introduction -- 1.1 Contributions -- 2 Preliminaries -- 2.1 Elliptic Curve Cryptography
3.2 Generation of Search Set and Displaying an Instance
A Single-Challenge Security Implies Multi-challenge Security -- B Justification of the Truncated q-RW Assumption -- References -- Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation -- Abstract -- 1 Introduction -- 2 Analyzing Display Electromagnetic Radiation Signal Properties -- 3 Evalution Algorithm -- 4 Experimental Results -- 5 Conclusion -- Acknowledgment -- References -- How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice? -- 1 Introduction -- 1.1 Contributions -- 2 Preliminaries -- 2.1 CPA -- 2.2 MIA -- 2.3 KSA -- 2.4 Sosd and Sost -- 3 Evaluation Framework -- 3.1 Metrics -- 3.2 Factors -- 4 Experimental Evaluation -- 4.1 Simulated Experiments -- 4.2 Practical Experiments. -- 4.3 Experimental Observations -- 5 Conclusions -- References -- Attribute Based Key-Insulated Signatures with Message Recovery -- 1 Introduction -- 1.1 Our Contribution -- 2 Preliminaries -- 2.1 ABKIS with Message Recovery Template -- 2.2 Security Definitions for ABKIS with Message Recovery -- 3 Proposed ABKIS with Message Recovery -- 3.1 ABKIS Scheme with Message Recovery for Small Universe -- 3.2 Large Universe ABKIS Scheme with Message Recovery -- 3.3 Security Proof of SU-ABKIS and LU-ABKIS -- 4 Some Possible Extensions -- 5 Conclusion -- References -- XOR Based Non-monotone t-(k,n)*-Visual Cryptographic Schemes Using Linear Algebra -- 1 Introduction -- 1.1 An Alternative for ``OR'' Based VCS -- 1.2 Our Contribution -- 2 The Model and Construction for t-(k,n)*-NM-XVCS -- 2.1 The Construction -- 3 On the Contrast of t-(k,n)*-NM-XVCS: Achieving Optimal Relative Contrast -- 3.1 (k-1)-(k,n)*-NM-XVCS -- 3.2 (n,n)-XVCS -- 4 Reducing Pixel Expansion -- 5 Achieving Optimality for both Pixel Expansion and Relative Contrast -- 6 Conclusion -- References
A Visual One-Time Password Authentication Scheme Using Mobile Devices -- 1 Introduction -- 2 Related Work -- 2.1 Visual Authentication -- 2.2 Authentication Using a Personal Device -- 2.3 One-Time Passwords -- 3 Model and Definition of the Visual One-Time Password Authentication System -- 4 Proposed Visual OTP Scheme -- 4.1 Design -- 4.2 Practical Issues -- 5 Discussion -- 5.1 Advantages of the Visual OTP Scheme -- 5.2 Limitations -- 6 Conclusion -- References -- Secure and Efficient Scheme for Delegation of Signing Rights -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 1.3 Outline of the Paper -- 2 Preliminaries -- 3 IBMPS Scheme and Its Security -- 3.1 Definition of IBMPS Scheme -- 3.2 Security Model for IBMPS Scheme -- 4 Proposed Scheme -- 4.1 Setup -- 4.2 Extraction -- 4.3 Proxy Key Generation -- 4.4 Multi-proxy Signature -- 4.5 Multi-proxy Verification -- 5 Correctness and Security Proof -- 5.1 Proof of Correctness of Our IBMPS Scheme -- 5.2 Proof of Security of Our IBMPS Scheme -- 6 Efficiency Comparison -- References -- Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator -- 1 Introduction -- 1.1 Our Approach -- 1.2 Related Work -- 2 Preliminaries -- 2.1 Bilinear Maps -- 2.2 Decisional Parallel BDHE Assumption -- 2.3 Linear Secret Sharing Schemes -- 3 Definition of CP-ABE with SEM -- 3.1 Fully-RCCA-CCA Security Model for CP-ABE with SEM -- 4 Our Construction of CP-ABE with SEM -- 4.1 Security Proof -- 5 Conclusion and Discussion -- References -- MOVTCHA: A CAPTCHA Based on Human Cognitive and Behavioral Features Analysis -- 1 Introduction -- 2 The Cognitive Task as MOVTCHA -- 2.1 Design and Execution of Movtcha -- 2.2 Cognitive and Behavioral Feature Extraction -- 2.3 Telling Computers and Humans Apart -- 3 Nuts and Bolts of Our System -- 3.1 Selecting Images to Be Tailored
2.2 Android and TrustStore -- 3 Attack Scenario -- 3.1 Self-signed Certificate -- 3.2 Installed Malicious Root CA-signed Certificate -- 4 TagDroid -- 4.1 Overview -- 4.2 ValMod -- 4.3 PeerVerify -- 5 Evaluation -- 5.1 Effectiveness -- 5.2 Performance -- 6 Related Work -- 7 Conclusion -- References -- A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter -- 1 Introduction -- 2 Preliminaries -- 3 1-st Minimum Algebraic Immunity AImin(f) -- 4 A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers via Our Theoretical Results -- 5 Application of Our Method on a LFSR-Based Stream Cipher Overlooking Our Criterion -- 6 Conclusion -- References -- A Private Lookup Protocol with Low Online Complexity for Secure Multiparty Computation -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 4 Protocol for Private Lookup -- 4.1 Speeding Up the Offline Phase -- 4.2 Speeding Up the Vector-Only Phase -- 5 Protocol for DFA Execution -- 6 Protocol for SSSD -- 7 Conclusions -- References -- Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors -- 1 Introduction -- 2 Multiplication Techniques -- 2.1 Operand Scanning Method -- 2.2 Product Scanning Method -- 2.3 Hybrid Method -- 2.4 Operand Caching Method -- 2.5 Karatsuba Multiplication -- 3 Our Implementation -- 3.1 Loop Structure -- 3.2 Inner-Loop Operation -- 4 Performance Evaluation and Comparison -- 5 Conclusions -- References -- New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security -- 1 Introduction -- 1.1 Background -- 1.2 Our Contribution -- 2 Definition of Identity-Based Encryption -- 2.1 Syntax -- 2.2 Security -- 3 Number Theoretic Assumptions -- 3.1 Definition of Assumptions -- 3.2 Relationship Between Assumptions -- 4 New Security Proof for the Boneh-Boyen IBE Scheme -- 5 Discussion
2.2 The X86-64 CPU Architecture -- 3 System Design and Implementation -- 3.1 System Overview -- 3.2 Implementation of Secure Scalar Multiplication in ECC -- 3.3 Deployment of ECC Cryptosystem in the Operating System -- 4 Evaluation and Discussion -- 4.1 Security Verification -- 4.2 Performance -- 5 Conclusion and Future Work -- References -- 4P_VES: A Collusion-Resistant Accountable Virtual Economy System -- 1 Introduction -- 2 System Model -- 3 Preliminaries -- 3.1 Commitment -- 3.2 Dynamic Accumulator -- 3.3 Cryptographic Assumptions -- 4 Scheme Construction -- 5 Property Analysis -- 6 Performance Evaluation -- 7 Related Work -- 8 Conclusion and Future Work -- References -- Privacy-Preserving Distance-Bounding Proof-of-Knowledge -- 1 Introduction -- 2 Background -- 2.1 Distance-Bounding Proof-of-Knowledge (DBPK-Log) -- 2.2 BBS+ Signature Scheme [6] -- 3 Model -- 4 PDB Construction -- 5 Conclusion -- References -- Distance Lower Bounding -- 1 Introduction -- 2 DLB - Model and Impossibilities -- 2.1 Attacks on DLB Protocols -- 2.2 Impossibility Results -- 2.3 Restricted DF, MiM, and CF -- 3 DLB Protocol Constructions -- 3.1 The Protocol DLB-BM -- 3.2 The Design of Erasure Sequence and Its Response -- 4 Security Analysis of DLB-BM -- 5 Practical Consideration -- 6 Concluding Remarks -- A Proof Sketch of Theorem 1 -- B Proof of Theorem 2 -- References -- Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC Framework -- 1 Introduction -- 2 Preliminaries -- 2.1 Bilinear Pairing and Mathematical Assumptions -- 2.2 Non-Interactive Verification of Pairing Product Equation [16] -- 3 Security Model of OTNk 1 -- 4 The Protocol -- 5 Security Analysis -- 6 Comparison -- References -- TagDroid: Hybrid SSL Certificate Verification in Android -- 1 Introduction -- 2 Background -- 2.1 Android and SSL Certificate Verification
Title Information and Communications Security
URI http://digital.casalini.it/9783319219660
https://cir.nii.ac.jp/crid/1130282269717543936
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=5577288
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783319219660
Volume 8958
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Nb9QwELXocqEXypdY2qIR4tYE5cuOlxsbLSotcGmpeotsN6uuQNsKB5D6P_p_mXHszW4AIbhEWSuajf0c-43tmcfYS_R0hCmMiE2KvkmRaB1rhV6rKJEcYDkXTg7ow0dx-Kk4OufnQWDcR5e0-pW5-W1cyf-gimWIK0XJ_gOyK6NYgPeIL14RYbwOyO_qZzh4vgo6DIFpfZiHPbBelK7z90V7OVj468P83BBRvatODnCKLtw8ROJDx_6grlPX7oYl05B0CFqLKWNS5Z539umcsEXaap2iDt5cq-um3yP60z_TLsWwGtVmNU58Nfqu14Vyk04bvVp8_OPKT7x-3SLlg3WLsG654c_mOaVnm4guf_AgEfZ0miF_omSKW2yrLNHTvvtmdvT-rF9S4-j7cFLuWNnxWb16u9tsW9nPOH_g3NJaIiPKKopBRW6xXCx-mZEdzTjdYSMKPXnA7jTLh-x-ENwAP_4-YrdrDQbYYLCJOwTc4TUQ6rDR9tC3fQQOcyAMIyDEgRCPwOEdQUAbHNqRew5teqQhIA0d0o_Z2dvZaXUYe12NWOWJUxWUmU7UPJ_rbELyB5I3WZlJnkkhJ3NpeKaRGDYqa4RJLvQ8NemFSPCjzhUtCJT5EzZaXi2bpwxKnjW8EAWlvStSJTW6oEZxw6WWOPSnY_Zirb3r71_cGQBbr4EikjHbDTDU-Il2udptzQukVSkfs31EpjYLuqa00Y6kVkxKJL7IpnMxZhAwq511f6y5nk0rztF7lPLZX0zssnt9F91jo_brt2YfyWarn_tO9hM5o3ZB
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Information+and+communications+security+%3A+16th+International+Conference%2C+ICICS+2014%2C+Hong+Kong%2C+China%2C+December+16-17%2C+2014+%3A+revised+selected+papers&rft.au=International+Conference+on+Information+and+Communications+Security&rft.au=Hui%2C+Lucas+Chi-Kwong&rft.date=2015-01-01&rft.pub=Springer&rft.isbn=9783319219653&rft.externalDocID=BB20644925
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97833192%2F9783319219660.jpg