Advances in Information and Computer Security -

Advances in Information and Computer Security

9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

Maki Yoshida, Koichi Mouri (Herausgeber)

Buch | Softcover
XII, 287 Seiten
2014
Springer International Publishing (Verlag)
978-3-319-09842-5 (ISBN)
51,36 inkl. MwSt
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.

System Security.- Privacy-Friendly Access Control Based on Personal Attributes.- Are You Threatening my Hazards?.- Complicating Process Identification by Replacing Process Information for Attack Avoidance.- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints.- Key Management for Onion Routing in a True Peer to Peer Setting (short paper).- Threshold Cryptography.- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication.- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper).- Secure Multi-party Computation for Elliptic Curves (short paper).- More Constructions of Re-splittable Threshold Public Key Encryption (short paper).- Hardware Security.- How to Effectively Decrease the Resource Requirement in Template Attack?.- Deterministic Hard Fault Attack on Trivium (short paper).- DPA Resilience of Rotation-Symmetric S-boxes.- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering.- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics.- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011.- Improved Linear Cryptanalysis of Reduced-Round MIBS.- Characterization of EME with Linear Mixing.- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper).- Encryption.- Related Key Secure PKE from Hash Proof Systems.- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper).- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper).

Erscheint lt. Verlag 4.8.2014
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XII, 287 p. 62 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 462 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Schlagworte Access Control • authentication • cryptography • Distributed Systems Security • Encryption • formal methods and theory of security • hardware attacks and countermeasures • hardware reverse engineering • hardware security implementation • Intrusion Detection Systems • Key Management • mathematical foundations of cryptography • operating systems security • public key (asymmetric) techniques • Security and Privacy • security in hardware • symmetric cryptography and hash functions • Systems Security • theory of database privacy and security • virtualization and security
ISBN-10 3-319-09842-X / 331909842X
ISBN-13 978-3-319-09842-5 / 9783319098425
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00