000 03987nam a22005055i 4500
001 978-3-319-09843-2
003 DE-He213
005 20200421111841.0
007 cr nn 008mamaa
008 140819s2014 gw | s |||| 0|eng d
020 _a9783319098432
_9978-3-319-09843-2
024 7 _a10.1007/978-3-319-09843-2
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
245 1 0 _aAdvances in Information and Computer Security
_h[electronic resource] :
_b9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings /
_cedited by Maki Yoshida, Koichi Mouri.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2014.
300 _aXII, 287 p. 62 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8639
505 0 _aSystem Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You Threatening my Hazards? -- Complicating Process Identification by Replacing Process Information for Attack Avoidance -- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints -- Key Management for Onion Routing in a True Peer to Peer Setting (short paper) -- Threshold Cryptography -- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication -- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper) -- Secure Multi-party Computation for Elliptic Curves (short paper) -- More Constructions of Re-splittable Threshold Public Key Encryption (short paper) -- Hardware Security -- How to Effectively Decrease the Resource Requirement in Template Attack? -- Deterministic Hard Fault Attack on Trivium (short paper) -- DPA Resilience of Rotation-Symmetric S-boxes -- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering -- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics -- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011 -- Improved Linear Cryptanalysis of Reduced-Round MIBS -- Characterization of EME with Linear Mixing -- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper) -- Encryption -- Related Key Secure PKE from Hash Proof Systems -- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper) -- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper).
520 _aThis book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.
650 0 _aComputer science.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aData Encryption.
700 1 _aYoshida, Maki.
_eeditor.
700 1 _aMouri, Koichi.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319098425
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8639
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-09843-2
912 _aZDB-2-SCS
912 _aZDB-2-LNC
942 _cEBK
999 _c55555
_d55555