Information and Communications Security 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012, Proceedings
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover...
Saved in:
| Main Authors | , |
|---|---|
| Format | eBook |
| Language | English |
| Published |
Netherlands
Springer Nature
2012
Springer Berlin / Heidelberg Springer |
| Edition | 1 |
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 3642341292 9783642341298 9783642341281 3642341284 |
Cover
Table of Contents:
- Secure Authentication Framework from the Client Side
- Conclusion -- References -- Privacy -- Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model -- Introduction -- Security Model -- Security Notion -- Security Model -- Notation and Preliminaries -- Our Construction -- CLM-DSS Scheme -- Security -- References -- Conversion of Real-Numbered Privacy-Preserving Problemsinto the Integer Domain -- Introduction -- Secure Multiparty Computation -- Secure Scaling -- Drawing Random Numbers from a Private Range -- Range N2m-1={0,1,2,…, 2m-1} -- Range Nq={0,1,…,q} -- Range Np,q={p, p+1,…, q} -- Secure Scaling -- Secure Scaling with Boolean Circuits -- Implementation -- Measurements -- Conclusions -- References -- Perfect Ambiguous Optimistic Fair Exchange -- Introduction -- Our Contributions -- Paper Organization -- Building Blocks -- Encryption -- Ambiguous Optimistic Fair Exchange -- Perfect Ambiguous Optimistic Fair Exchange -- PAOFE Models -- Generic Construction -- Security Analysis -- Conclusion -- References -- Privacy-Preserving Noisy Keyword Search in Cloud Computing -- Introduction -- Related Work -- Our Contribution -- Useful Tools -- Preliminaries -- Secure Sketch and Fuzzy Extractor -- General Framework -- Definition for Noisy-Keyword-Based Searchable Private-Key Encryption -- Security Definition -- Efficient and Secure Noisy-Keyword-Based Searchable Private-Key Encryption -- The Proof of Security -- Performance -- Exact Efficiency of the Proposed Scheme -- Comparison -- Conclusion and Future Work -- References -- Protocols -- Forward Secure Attribute-Based Signatures -- Introduction -- Key Exposure Problem -- Contribution -- Preliminaries -- Monotone Span Programs -- NIWI Proof of Knowledge -- Security Models -- Syntax of Forward Secure Attribute-Based Signatures -- Notions of Security of Forward Secure Attribute-Based Signatures
- Permission-Based Abnormal Application Detection for Android -- Introduction -- Related Work -- Security Framework -- Permission-Based Abnormal Application Detection Framework Overview -- Model Selection -- Experiment -- Selection of Permissions to Be Predicted -- Dataset -- Results -- Evaluation of Model -- Pick Up Influential Words -- Permission Comparator -- Method to Detect Reliability of Permissions -- Test on Real Malware -- Conclusion -- References -- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data -- Introduction -- Mobile Phone Forensics Research -- Symbian Deleted SMS Recovery -- Symbian AllFiles Capability -- Reconstruction of Active and Deleted SMS Messages -- Future Work -- Conclusions -- References -- Software Security -- Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis -- Introduction -- Problem Statement -- Our Approach -- Process Emulation -- Program Partitioning -- Intermediate Language -- Assembly-to-IL Translation -- Template Matching -- Dynamic Data Verification -- Experiment and Evaluation -- Discussion -- Countermeasures -- Conclusion -- References -- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine -- Introduction -- Information Flow and Tainting in the LLVM -- Taint Semantics -- Conclusions -- References -- Short Papers -- Authentication -- A Generic Approach for Providing Revocation Support in Secret Handshake -- Introduction -- System Model -- A Generic Approach -- Confidential Group Communication -- Our Approach -- References -- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy -- Introduction -- Our Protocol -- Security Analysis -- Conclusion -- References -- Exploring Mobile Proxies for Better Password Authentication -- Introduction -- Related Work
- Lecture Notes in Computer Science -- Preface -- Organization -- Table of Contents -- Full Papers -- Applied Cryptography -- Audio Steganalysis Based on Lossless Data-Compression Techniques -- Introduction -- Lossless Data-Compression and Signal Energy -- Active Speech Level -- Features Extraction -- Evaluation Measures -- Datasets -- Results -- Conclusion -- References -- Enhancing the Perceived Visual Quality of a SizeInvariant Visual Cryptography Scheme -- Introduction -- Preliminaries -- Fundamentals of VCSs -- VCSs for Grayscale Images -- Related Work -- Image Filtering -- Block Threshold Visual Cryptography -- Results and Discussions -- Conclusion -- References -- Impact of the Revocation Service in PKI Prices -- Introduction -- Related Work -- Modeling the Certificate Provider Competition -- Demand for Certificates -- Supply of Certificates -- Equilibrium Certificate Providers -- Duopoly of CAs -- Analysis and Results -- Impact of the Preference Ratio 21 -- Impact of the Security Level Difference -- Impact of the QoS of the Revocation Mechanism -- Impact of the Revocation Probability -- Case Study: SSL Providers -- Conclusions -- References -- Cryptanalysis -- Cryptanalysis of Multi-Prime RSA with Small Prime Difference -- Introduction -- Preliminaries -- The Attack -- Comparison -- Numerical Example -- Conclusion and Futures Work -- References -- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem -- Introduction -- Description of the Public Key Encryption System -- Attack on the Public Key Encryption Scheme -- Recovering Relations on Secret Matrices and Factoringthe RSA Modulus -- Partial Information Recovery of Secret Matrices D and F -- Ciphertext-Only Attack -- Conclusion -- References -- Improved Related-Key Differential Attacks on Reduced-Round LBlock -- Introduction -- Preliminary -- Notations
- A Brief Description of LBlock -- The Related-Key Boomerang Attack -- Related-Key Boomerang Attack on 16-Round LBlock -- The Subkey Differences -- The 16-Round Related-Key Boomerang Distinguisher -- Related-Key Differential Attack on 22-Round LBlock -- The Subkey Differences -- The 16-Round Related-Key Truncated Differential -- The Key Recovery Attack for 22 Rounds -- Conclusions -- References -- Network Security -- Countermeasures on Application Level Low-Rate Denial-of-Service Attack -- Introduction -- Related Works -- Detecting LRDoS Attacks -- Defending against LRDoS Attacks -- Evaluation -- Target Victim -- Simulation Results -- Testbed Results -- Conclusions -- References -- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test -- Introduction -- Related Work -- Proposed Work -- Mathematical Model -- Evaluation -- DR-RFOD vs DR-RFO -- The Effect of Error Precision (α) on DR-RFOD Mechanism -- Conclusion -- References -- Group Behavior Metrics for P2P Botnet Detection -- Introduction -- Related Work -- Group Behavior in P2P Botnets -- Group Behavior Metrics -- Topological Properties -- Traffic Pattern Statistics -- Protocol Sequence Signature -- Group Behavior Graph -- Results and Evaluation -- Experimental Setup -- Group Behavior in Topology -- Group Behavior in Traffic Pattern -- Group Behavior in Protocol Sequence -- Conclusion -- References -- Optimization -- Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA -- Introduction -- Preliminary: SM3 Hash Algorithm -- Message Padding and Parsing -- Message Expansion -- Message Compression -- Proposed Compact Architecture -- Critical Path -- Message Expansion -- SIS-Based Compact Architecture -- Proposed High-Throughput Architecture -- High-Throughput Architecture -- Message Expansion -- Hardware Performance Evaluation -- Related Work
- Our Generic Forward Secure Attribute-Based Signature Scheme -- Forward Secure Credential Bundle -- Forward Secure ABS Construction -- Conclusion -- References -- On Constant-Round Precise Zero-Knowledge -- Introduction -- Our Results -- Organizations -- Barriers for Constructing Constant-Round Precise Zero-Knowledge -- Precise Zero-Knowledge -- Barriers for Achieving Constant-Round Constructions -- Our Relaxation -- The Relaxed Definition -- Limitations of the Known Techniques -- The Protocol -- The Overview -- Our Language and Protocol -- The Precise Simulator -- The Description -- Analysis -- Conclusions -- References -- Outsourcing Encryption of Attribute-Based Encryption with Map Reduce -- Introduction -- Contribution -- Related Work -- Organization -- System Model -- MapReduce -- System Model -- Adversary Model -- Proposed Construction -- Access Structure -- Our Construction -- Security Analysis -- Conclusion -- References -- Security Enhancement of Identity-Based Identification with Reversibility -- Introduction -- Definitions -- Proposed Security Enhancement Transformations -- Description -- Security -- Discussions -- Conclusion -- References -- Security in Mobile Systems -- Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture -- Introduction -- Contributions -- Organisation -- Motivation for Coopetitive Architecture -- Coopetitive Architecture for Smart Cards -- Smart Card Architecture Overview -- Trusted Environment and Execution Manager (TEM) -- Application Acquisition and Contractual Agreement Framework -- Security and Operational Goals -- Enrolment Phase -- Proposed Protocol -- Analysis of the ACAP Protocol -- Brief Informal Analysis of the Protocol -- Protocol Verification by CasperFDR -- Practical Implementation -- Conclusion and Future Research Directions -- References