skip to content
Advances in Information and Computer Security : 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings Preview this item
ClosePreview this item
Checking...

Advances in Information and Computer Security : 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

Author: Maki Yoshida; Koichi Mouri
Publisher: Cham : Springer International Publishing, 2014.
Series: SpringerLink : Bücher; Lecture notes in computer science, 8639.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Maki Yoshida; Koichi Mouri
ISBN: 9783319098425 331909842X 9783319098432 3319098438
OCLC Number: 890776404
Description: Online-Ressource.
Contents: System Security --
Privacy-Friendly Access Control Based on Personal Attributes --
Are You Threatening my Hazards? --
Complicating Process Identification by Replacing Process Information for Attack Avoidance --
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints --
Key Management for Onion Routing in a True Peer to Peer Setting (short paper) --
Threshold Cryptography --
Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication --
Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper) --
Secure Multi-party Computation for Elliptic Curves (short paper) --
More Constructions of Re-splittable Threshold Public Key Encryption (short paper) --
Hardware Security --
How to Effectively Decrease the Resource Requirement in Template Attack? --
Deterministic Hard Fault Attack on Trivium (short paper) --
DPA Resilience of Rotation-Symmetric S-boxes --
A Technique using PUFs for protecting circuit layout designs against Reverse Engineering --
Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics --
Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011 --
Improved Linear Cryptanalysis of Reduced-Round MIBS --
Characterization of EME with Linear Mixing --
Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper) --
Encryption --
Related Key Secure PKE from Hash Proof Systems --
Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper) --
Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper).
Series Title: SpringerLink : Bücher; Lecture notes in computer science, 8639.
Responsibility: edited by Maki Yoshida, Koichi Mouri.

Abstract:

This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The focus of the workshop was on the following  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/890776404> # Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
   library:oclcnum "890776404" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/2037005764#Place/cham> ; # Cham
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/2037005764#Topic/computer_science> ; # Computer science
   schema:about <http://experiment.worldcat.org/entity/work/data/2037005764#Topic/data_encryption> ; # Data encryption
   schema:about <http://dewey.info/class/005.8/e23/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/2037005764#Topic/data_protection> ; # Data protection
   schema:bookFormat schema:EBook ;
   schema:contributor <http://experiment.worldcat.org/entity/work/data/2037005764#Person/mouri_koichi> ; # Koichi Mouri
   schema:contributor <http://experiment.worldcat.org/entity/work/data/2037005764#Person/yoshida_maki> ; # Maki Yoshida
   schema:datePublished "2014" ;
   schema:description "This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption." ;
   schema:description "System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You Threatening my Hazards? -- Complicating Process Identification by Replacing Process Information for Attack Avoidance -- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints -- Key Management for Onion Routing in a True Peer to Peer Setting (short paper) -- Threshold Cryptography -- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication -- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper) -- Secure Multi-party Computation for Elliptic Curves (short paper) -- More Constructions of Re-splittable Threshold Public Key Encryption (short paper) -- Hardware Security -- How to Effectively Decrease the Resource Requirement in Template Attack? -- Deterministic Hard Fault Attack on Trivium (short paper) -- DPA Resilience of Rotation-Symmetric S-boxes -- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering -- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics -- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011 -- Improved Linear Cryptanalysis of Reduced-Round MIBS -- Characterization of EME with Linear Mixing -- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper) -- Encryption -- Related Key Secure PKE from Hash Proof Systems -- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper) -- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper)." ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/2037005764> ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/2037005764#Series/springerlink_bucher> ; # SpringerLink : Bücher
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/2037005764#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
   schema:name "Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings" ;
   schema:productID "890776404" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/890776404#PublicationEvent/cham_springer_international_publishing_2014> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/2037005764#Agent/springer_international_publishing> ; # Springer International Publishing
   schema:url <http://dx.doi.org/10.1007/978-3-319-09843-2> ;
   schema:url <http://swbplus.bsz-bw.de/bsz414026284cov.htm> ;
   schema:workExample <http://dx.doi.org/10.1007/978-3-319-09843-2> ;
   schema:workExample <http://worldcat.org/isbn/9783319098425> ;
   schema:workExample <http://worldcat.org/isbn/9783319098432> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/890776404> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/2037005764#Agent/springer_international_publishing> # Springer International Publishing
    a bgn:Agent ;
   schema:name "Springer International Publishing" ;
    .

<http://experiment.worldcat.org/entity/work/data/2037005764#Person/mouri_koichi> # Koichi Mouri
    a schema:Person ;
   schema:familyName "Mouri" ;
   schema:givenName "Koichi" ;
   schema:name "Koichi Mouri" ;
    .

<http://experiment.worldcat.org/entity/work/data/2037005764#Person/yoshida_maki> # Maki Yoshida
    a schema:Person ;
   schema:familyName "Yoshida" ;
   schema:givenName "Maki" ;
   schema:name "Maki Yoshida" ;
    .

<http://experiment.worldcat.org/entity/work/data/2037005764#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/890776404> ; # Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
   schema:name "Lecture notes in computer science ;" ;
   schema:name "Lecture Notes in Computer Science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/2037005764#Series/springerlink_bucher> # SpringerLink : Bücher
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/890776404> ; # Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
   schema:name "SpringerLink : Bücher" ;
    .

<http://worldcat.org/isbn/9783319098425>
    a schema:ProductModel ;
   schema:isbn "331909842X" ;
   schema:isbn "9783319098425" ;
    .

<http://worldcat.org/isbn/9783319098432>
    a schema:ProductModel ;
   schema:isbn "3319098438" ;
   schema:isbn "9783319098432" ;
    .

<http://www.worldcat.org/title/-/oclc/890776404>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/890776404> ; # Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
   schema:dateModified "2017-10-21" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.