Advances in Information and Computer Security
9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
Herausgegeben:Yoshida, Maki; Mouri, Koichi
Advances in Information and Computer Security
9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
Herausgegeben:Yoshida, Maki; Mouri, Koichi
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.
Andere Kunden interessierten sich auch für
- Applied Cryptography and Network Security37,99 €
- Applied Cryptography and Network Security59,99 €
- Topics in Cryptology ¿- CT-RSA 201537,99 €
- Constructive Side-Channel Analysis and Secure Design37,99 €
- Advances in Cryptology ¿ CRYPTO 201873,99 €
- Advances in Cryptology ¿ CRYPTO 201875,99 €
- Information Theoretic Security37,99 €
-
-
-
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 8639
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-319-09842-5
- 2014
- Seitenzahl: 300
- Erscheinungstermin: 4. August 2014
- Englisch
- Abmessung: 235mm x 155mm x 17mm
- Gewicht: 458g
- ISBN-13: 9783319098425
- ISBN-10: 331909842X
- Artikelnr.: 41161212
- Lecture Notes in Computer Science 8639
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-319-09842-5
- 2014
- Seitenzahl: 300
- Erscheinungstermin: 4. August 2014
- Englisch
- Abmessung: 235mm x 155mm x 17mm
- Gewicht: 458g
- ISBN-13: 9783319098425
- ISBN-10: 331909842X
- Artikelnr.: 41161212
System Security.- Privacy-Friendly Access Control Based on Personal Attributes.- Are You Threatening my Hazards?.- Complicating Process Identification by Replacing Process Information for Attack Avoidance.- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints.- Key Management for Onion Routing in a True Peer to Peer Setting (short paper).- Threshold Cryptography.- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication.- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper).- Secure Multi-party Computation for Elliptic Curves (short paper).- More Constructions of Re-splittable Threshold Public Key Encryption (short paper).- Hardware Security.- How to Effectively Decrease the Resource Requirement in Template Attack?.- Deterministic Hard Fault Attack on Trivium (short paper).- DPA Resilience of Rotation-Symmetric S-boxes.- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering.- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics.- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011.- Improved Linear Cryptanalysis of Reduced-Round MIBS.- Characterization of EME with Linear Mixing.- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper).- Encryption.- Related Key Secure PKE from Hash Proof Systems.- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper).- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper).
System Security.- Privacy-Friendly Access Control Based on Personal Attributes.- Are You Threatening my Hazards?.- Complicating Process Identification by Replacing Process Information for Attack Avoidance.- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints.- Key Management for Onion Routing in a True Peer to Peer Setting (short paper).- Threshold Cryptography.- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication.- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper).- Secure Multi-party Computation for Elliptic Curves (short paper).- More Constructions of Re-splittable Threshold Public Key Encryption (short paper).- Hardware Security.- How to Effectively Decrease the Resource Requirement in Template Attack?.- Deterministic Hard Fault Attack on Trivium (short paper).- DPA Resilience of Rotation-Symmetric S-boxes.- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering.- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics.- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011.- Improved Linear Cryptanalysis of Reduced-Round MIBS.- Characterization of EME with Linear Mixing.- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper).- Encryption.- Related Key Secure PKE from Hash Proof Systems.- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper).- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper).