


default search action
20th ICICS 2018: Lille, France
- David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang

, Ahmed Meddahi:
Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11149, Springer 2018, ISBN 978-3-030-01949-5
Full Paper Session I: Blockchain Technology
- Yuan Zhang

, Xiaodong Lin, Chunxiang Xu:
Blockchain-Based Secure Data Provenance for Cloud Storage. 3-19 - Henning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter:

uMine: A Blockchain Based on Human Miners. 20-38
Full Paper Session II: Malware, Botnet and Network Security
- Xi Luo, Liming Wang, Zhen Xu, Wei An:

LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains. 41-56 - Jie Yin, Heyang Lv, Fangjiao Zhang, Zhihong Tian, Xiang Cui:

Study on Advanced Botnet Based on Publicly Available Resources. 57-74 - Yingpei Zeng, Shanqing Guo:

Deep Packet Inspection with Delayed Signature Matching in Network Auditing. 75-91 - Dan Tang, Rui Dai, Liu Tang, Sijia Zhan, Jianping Man:

Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis. 92-104
Full Paper Session III: Real-World Cryptography
- Chenyu Wang, Tao Huang, Hongjun Wu

:
On the Weakness of Constant Blinding PRNG in Flash Player. 107-123 - George Teseleanu

:
Random Number Generators Can Be Fooled to Behave Badly. 124-141 - Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong:

Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation. 142-157
Full Paper Session IV: Encrypted Computing
- Shakirah Hashim

, Mohammed Benaissa:
Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain Multiplication. 161-176 - Alessandro Barenghi

, Nicholas Mainardi
, Gerardo Pelosi
:
Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes. 177-191 - Peter T. Breuer

, Jonathan P. Bowen
, Esther Palomar
, Zhiming Liu:
On Security in Encrypted Computing. 192-211
Full Paper Session V: Privacy Protection
- Meng Zheng, Jun Zhou, Zhenfu Cao

, Xiaolei Dong:
PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing. 215-231 - Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens:

Linking Differential Identifiability with Differential Privacy. 232-247 - Zhili Chen, Sheng Chen, Hong Zhong, Lin Chen, Miaomiao Tian:

PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction. 248-267
Full Paper Session VI: Signature Schemes
- Lin Hou, Renzhang Liu, Tian Qiu, Dongdai Lin:

Hierarchical Group Signatures with Verifier-Local Revocation. 271-286 - Maharage Nisansala Sevwandi Perera, Takeshi Koshiba

:
Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation. 287-302 - Carsten Baum, Huang Lin, Sabine Oechsner

:
Towards Practical Lattice-Based One-Time Linkable Ring Signatures. 303-322
Full Paper Session VII: Attack Analysis and Detection
- Zhiyuan Zhao, Chenxu Wang, Wei Rao:

Slop: Towards an Efficient and Universal Streaming Log Parser. 325-341 - Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng:

Community Discovery of Attribution Trace Based on Deep Learning Approach. 342-357 - Yun Guo, Daniel Sun, Guoqiang Li, Shiping Chen

:
Examine Manipulated Datasets with Topology Data Analysis: A Case Study. 358-373
Full Paper Session VIII: Searchable Encryption and Identity-Based Cryptography
- Yunong Liang

, Zhenfu Cao
, Xiaolei Dong
, Jiachen Shen
:
Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption. 377-392 - Cédric Van Rompay, Refik Molva, Melek Önen

:
Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage. 393-408 - Kelly Yun

, Xin Wang, Rui Xue:
Identity-Based Functional Encryption for Quadratic Functions from Lattices. 409-425 - Rui Zhang, Yang Tao:

Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption. 426-441
Full Paper Session IX: Verifiable Storage and Computing
- Changsong Yang, Jianfeng Wang

, Xiaoling Tao, Xiaofeng Chen:
Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage. 445-458 - Henning Kopp, Frank Kargl, Christoph Bösch:

Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons. 459-477 - Xingfeng Wang, Liang Zhao:

Verifiable Single-Server Private Information Retrieval. 478-493
Full Paper Session X: Applied Cryptography
- Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan:

Cryptographic Password Obfuscation. 497-512 - Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan

:
CCA Secure Multi-recipient KEM from LPN. 513-529 - Hiroaki Anada, Seiko Arita:

Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global Identities. 530-547
Full Paper Session XI: Supporting Techniques
- Kai Chen, Ning Zhang, Liming Wang, Zhen Xu:

Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree. 551-565 - Min Zhu, Kun Zhang, Bibo Tu:

PCA: Page Correlation Aggregation for Memory Deduplication in Virtualized Environments. 566-583 - Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu:

Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data. 584-597 - Yao Lu, Noboru Kunihiro

, Rui Zhang, Liqiang Peng, Hui Ma:
Certifying Variant of RSA with Generalized Moduli. 598-608
Full Paper Session XII: Formal Analysis and Cryptanalysis
- Florian Kammüller:

Attack Trees in Isabelle. 611-628 - Fan Zhang, Cong Zhang, Mingdi Xu, Xiaoli Liu, Fangning Hu, Han-Chieh Chao

:
Automated Verification of Noninterference Property. 629-646 - Ya Han, Yongqiang Li, Mingsheng Wang:

Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets. 647-663 - Mingjiang Huang, Liming Wang, Yan Zhang:

Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications. 664-681
Short Paper Session I: Attack Detection
- Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li:

MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query. 685-695 - Abdullahi Chowdhury

, Gour C. Karmakar, Joarder Kamruzzaman
, Tapash Saha:
Detecting Intrusion in the Traffic Signals of an Intelligent Traffic System. 696-707 - Mamoru Mimura

, Hidema Tanaka:
A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs. 708-718
Short Paper Session II: Security Management
- Lin Wang

, Min Zhu, Qing Li, Bibo Tu:
Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters. 721-731 - Xiaoshu Ji, Gurvan Le Guernic

, Nora Cuppens-Boulahia, Frédéric Cuppens:
USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework. 732-742
Short Paper Session III: Applied Cryptography
- Carlos Andres Lara-Nino

, Arturo Diaz-Perez
, Miguel Morales-Sandoval
:
FPGA-Based Assessment of Midori and Gift Lightweight Block Ciphers. 745-755 - Haitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan

:
Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor. 756-766 - Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng:

PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX. 767-777
Short Paper Session IV: Applied Cryptography
- Thanh Bui

, Tuomas Aura
:
Application of Public Ledgers to Revocation in Distributed Access Control. 781-792 - Peifang Ni, Hongda Li, Dongxue Pan:

Micropaying to a Distributed Payee with Instant Confirmation. 793-804 - Ping Wang, Zijian Zhang, Ding Wang

:
Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment. 805-816

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














