Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the wo...

Full description

Bibliographic Details
Other Authors: Yoshida, Maki (Editor), Mouri, Koichi (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2014, 2014
Edition:1st ed. 2014
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03386nmm a2200325 u 4500
001 EB000895965
003 EBX01000000000000000693085
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140908 ||| eng
020 |a 9783319098432 
100 1 |a Yoshida, Maki  |e [editor] 
245 0 0 |a Advances in Information and Computer Security  |h Elektronische Ressource  |b 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings  |c edited by Maki Yoshida, Koichi Mouri 
250 |a 1st ed. 2014 
260 |a Cham  |b Springer International Publishing  |c 2014, 2014 
300 |a XII, 287 p. 62 illus  |b online resource 
505 0 |a System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You Threatening my Hazards? -- Complicating Process Identification by Replacing Process Information for Attack Avoidance -- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints -- Key Management for Onion Routing in a True Peer to Peer Setting (short paper) -- Threshold Cryptography -- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication -- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper) -- Secure Multi-party Computation for Elliptic Curves (short paper) -- More Constructions of Re-splittable Threshold Public Key Encryption (short paper) -- Hardware Security -- How to Effectively Decrease the Resource Requirement in Template Attack? -- Deterministic Hard Fault Attack on Trivium (short paper) -- DPA Resilience of Rotation-Symmetric S-boxes -- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering -- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics -- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011 -- Improved Linear Cryptanalysis of Reduced-Round MIBS -- Characterization of EME with Linear Mixing -- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper) -- Encryption -- Related Key Secure PKE from Hash Proof Systems -- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper) -- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper) 
653 |a Cryptography 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Data and Information Security 
700 1 |a Mouri, Koichi  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-319-09843-2 
856 4 0 |u https://doi.org/10.1007/978-3-319-09843-2?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption