15. ICICS 2013: Beijing, China

System Security

Web Security and Worm Detection

Cloud Storage Security

Virtualization for Cloud Computing

Trusted and Trustworthy Computing

Authentication and Security Protocols

Intrusion Detection and Recovery

Side Channel Attacks and Defense

Engineering Issues of Crypto


Attribute-Based Encryption

Cryptographic Primitives and Applications

a service of Schloss Dagstuhl - Leibniz Center for Informatics