Advances in Information and Computer Security (eBook, PDF)
9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
Redaktion: Yoshida, Maki; Mouri, Koichi
38,95 €
38,95 €
inkl. MwSt.
Sofort per Download lieferbar
19 °P sammeln
38,95 €
Als Download kaufen
38,95 €
inkl. MwSt.
Sofort per Download lieferbar
19 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
38,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
19 °P sammeln
Advances in Information and Computer Security (eBook, PDF)
9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
Redaktion: Yoshida, Maki; Mouri, Koichi
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 5.16MB
Andere Kunden interessierten sich auch für
- Information Security Practice and Experience (eBook, PDF)40,95 €
- Applied Cryptography and Network Security (eBook, PDF)40,95 €
- Constructive Side-Channel Analysis and Secure Design (eBook, PDF)40,95 €
- Information Theoretic Security (eBook, PDF)40,95 €
- Innovative Security Solutions for Information Technology and Communications (eBook, PDF)40,95 €
- Applied Cryptography and Network Security (eBook, PDF)65,95 €
- Applied Cryptography and Network Security (eBook, PDF)81,95 €
-
-
-
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 287
- Erscheinungstermin: 19. August 2014
- Englisch
- ISBN-13: 9783319098432
- Artikelnr.: 43886149
- Verlag: Springer International Publishing
- Seitenzahl: 287
- Erscheinungstermin: 19. August 2014
- Englisch
- ISBN-13: 9783319098432
- Artikelnr.: 43886149
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
System Security.- Privacy-Friendly Access Control Based on Personal Attributes.- Are You Threatening my Hazards?.- Complicating Process Identification by Replacing Process Information for Attack Avoidance.- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints.- Key Management for Onion Routing in a True Peer to Peer Setting (short paper).- Threshold Cryptography.- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication.- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper).- Secure Multi-party Computation for Elliptic Curves (short paper).- More Constructions of Re-splittable Threshold Public Key Encryption (short paper).- Hardware Security.- How to Effectively Decrease the Resource Requirement in Template Attack?.- Deterministic Hard Fault Attack on Trivium (short paper).- DPA Resilience of Rotation-Symmetric S-boxes.- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering.- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics.- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011.- Improved Linear Cryptanalysis of Reduced-Round MIBS.- Characterization of EME with Linear Mixing.- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper).- Encryption.- Related Key Secure PKE from Hash Proof Systems.- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper).- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper).
System Security.- Privacy-Friendly Access Control Based on Personal Attributes.- Are You Threatening my Hazards?.- Complicating Process Identification by Replacing Process Information for Attack Avoidance.- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints.- Key Management for Onion Routing in a True Peer to Peer Setting (short paper).- Threshold Cryptography.- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication.- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper).- Secure Multi-party Computation for Elliptic Curves (short paper).- More Constructions of Re-splittable Threshold Public Key Encryption (short paper).- Hardware Security.- How to Effectively Decrease the Resource Requirement in Template Attack?.- Deterministic Hard Fault Attack on Trivium (short paper).- DPA Resilience of Rotation-Symmetric S-boxes.- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering.- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics.- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011.- Improved Linear Cryptanalysis of Reduced-Round MIBS.- Characterization of EME with Linear Mixing.- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper).- Encryption.- Related Key Secure PKE from Hash Proof Systems.- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper).- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper).