20th ICICS 2018:
Lille, France
share record
short URL:
https://dblp.org/rec/conf/icics/2018 David Naccache ,
Shouhuai Xu ,
Sihan Qing ,
Pierangela Samarati ,
Gregory Blanc ,
Rongxing Lu ,
Zonghua Zhang ,
Ahmed Meddahi :
Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11149,
Springer 2018 , ISBN
978-3-030-01949-5
Full Paper Session I:
Blockchain Technology
share record
short URL:
https://dblp.org/rec/conf/icics/0006LX18 share record
short URL:
https://dblp.org/rec/conf/icics/KoppKBP18
Full Paper Session II:
Malware, Botnet and Network Security
share record
short URL:
https://dblp.org/rec/conf/icics/LuoWXA18 share record
short URL:
https://dblp.org/rec/conf/icics/YinLZTC18 share record
short URL:
https://dblp.org/rec/conf/icics/ZengG18 share record
short URL:
https://dblp.org/rec/conf/icics/TangDTZM18
Full Paper Session III:
Real-World Cryptography
share record
short URL:
https://dblp.org/rec/conf/icics/WangHW18 share record
short URL:
https://dblp.org/rec/conf/icics/Teseleanu18 George Teseleanu :
Random Number Generators Can Be Fooled to Behave Badly. 124-141 share record
short URL:
https://dblp.org/rec/conf/icics/WangZLD18
Full Paper Session IV:
Encrypted Computing
share record
short URL:
https://dblp.org/rec/conf/icics/HashimB18 share record
short URL:
https://dblp.org/rec/conf/icics/BarenghiMP18 share record
short URL:
https://dblp.org/rec/conf/icics/BreuerBP018
Full Paper Session V:
Privacy Protection
share record
short URL:
https://dblp.org/rec/conf/icics/ZhengZCD18 share record
short URL:
https://dblp.org/rec/conf/icics/BkakriaCC18 share record
short URL:
https://dblp.org/rec/conf/icics/ChenC0CT18
Full Paper Session VI:
Signature Schemes
share record
short URL:
https://dblp.org/rec/conf/icics/HouLQL18 share record
short URL:
https://dblp.org/rec/conf/icics/PereraK18 share record
short URL:
https://dblp.org/rec/conf/icics/BaumLO18
Full Paper Session VII:
Attack Analysis and Detection
share record
short URL:
https://dblp.org/rec/conf/icics/ZhaoWR18 share record
short URL:
https://dblp.org/rec/conf/icics/XuY0C18 share record
short URL:
https://dblp.org/rec/conf/icics/GuoS0C18
Full Paper Session VIII:
Searchable Encryption and Identity-Based Cryptography
share record
short URL:
https://dblp.org/rec/conf/icics/LiangCDS18 share record
short URL:
https://dblp.org/rec/conf/icics/RompayMO18 share record
short URL:
https://dblp.org/rec/conf/icics/YunWX18 share record
short URL:
https://dblp.org/rec/conf/icics/ZhangT18 Rui Zhang ,
Yang Tao :
Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption. 426-441
Full Paper Session IX:
Verifiable Storage and Computing
share record
short URL:
https://dblp.org/rec/conf/icics/YangWTC18 share record
short URL:
https://dblp.org/rec/conf/icics/KoppKB18 share record
short URL:
https://dblp.org/rec/conf/icics/WangZ18
Full Paper Session X:
Applied Cryptography
share record
short URL:
https://dblp.org/rec/conf/icics/CrescenzoBC18 share record
short URL:
https://dblp.org/rec/conf/icics/ChengLQY18 share record
short URL:
https://dblp.org/rec/conf/icics/AnadaA18 Hiroaki Anada ,
Seiko Arita :
Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global Identities. 530-547
Full Paper Session XI:
Supporting Techniques
share record
short URL:
https://dblp.org/rec/conf/icics/ChenZWX18 share record
short URL:
https://dblp.org/rec/conf/icics/ZhuZT18 Min Zhu ,
Kun Zhang ,
Bibo Tu :
PCA: Page Correlation Aggregation for Memory Deduplication in Virtualized Environments. 566-583 share record
short URL:
https://dblp.org/rec/conf/icics/HanWXZL18 share record
short URL:
https://dblp.org/rec/conf/icics/LuKZPM18
Full Paper Session XII:
Formal Analysis and Cryptanalysis
share record
short URL:
https://dblp.org/rec/conf/icics/Kammuller18 share record
short URL:
https://dblp.org/rec/conf/icics/ZhangZXLHC18 share record
short URL:
https://dblp.org/rec/conf/icics/HanLW18 share record
short URL:
https://dblp.org/rec/conf/icics/HuangWZ18
Short Paper Session I:
Attack Detection
share record
short URL:
https://dblp.org/rec/conf/icics/PengY0L18 export record
dblp key:
conf/icics/ChowdhuryKKS18 share record
short URL:
https://dblp.org/rec/conf/icics/ChowdhuryKKS18 share record
short URL:
https://dblp.org/rec/conf/icics/MimuraT18
Short Paper Session II:
Security Management
share record
short URL:
https://dblp.org/rec/conf/icics/WangZLT18 share record
short URL:
https://dblp.org/rec/conf/icics/JiGCC18
Short Paper Session III:
Applied Cryptography
share record
short URL:
https://dblp.org/rec/conf/icics/Lara-NinoDM18 share record
short URL:
https://dblp.org/rec/conf/icics/ChengLQY18a share record
short URL:
https://dblp.org/rec/conf/icics/LiLLC18
Short Paper Session IV:
Applied Cryptography
share record
short URL:
https://dblp.org/rec/conf/icics/BuiA18 Thanh Bui ,
Tuomas Aura :
Application of Public Ledgers to Revocation in Distributed Access Control. 781-792 share record
short URL:
https://dblp.org/rec/conf/icics/NiLP18 share record
short URL:
https://dblp.org/rec/conf/icics/WangZW18
maintained by
, founded at