Synopses & Reviews
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
Table of Contents
Audio Steganalysis Based on Lossless Data-Compression Techniques.- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme.- Impact of the Revocation Service in PKI Prices.- Cryptanalysis of Multi-Prime RSA with Small Prime Difference.- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem.- Improved Related-Key Differential Attacks on Reduced-Round LBlock.- Countermeasures on Application Level Low-Rate Denial-of-Service Attack.- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test.- Group Behavior Metrics for P2P Botnet Detection.- Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA.- Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.- Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain.- Perfect Ambiguous Optimistic Fair Exchange.- Privacy-Preserving Noisy Keyword Search in Cloud Computing.- Forward Secure Attribute-Based Signatures.- On Constant-Round Precise Zero-Knowledge.- Outsourcing Encryption of Attribute-Based Encryption with MapReduce.- Security Enhancement of Identity-Based Identification with Reversibility.- Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture.- Permission-Based Abnormal Application Detection for Android.- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data.- Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis.- Taint Analysis of Security Code in the KLEE Symbolic Execution Engine.- A Generic Approach for Providing Revocation Support in Secret Handshake.- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy.- Exploring Mobile Proxies for Better Password Authentication.-