Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Advances in Information and Computer Security -

Advances in Information and Computer Security

9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

Maki Yoshida, Koichi Mouri (Herausgeber)

Buch | Softcover
XII, 287 Seiten
2014 | 2014
Springer International Publishing (Verlag)
978-3-319-09842-5 (ISBN)
CHF 71,90 inkl. MwSt
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.

System Security.- Privacy-Friendly Access Control Based on Personal Attributes.- Are You Threatening my Hazards?.- Complicating Process Identification by Replacing Process Information for Attack Avoidance.- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints.- Key Management for Onion Routing in a True Peer to Peer Setting (short paper).- Threshold Cryptography.- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication.- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper).- Secure Multi-party Computation for Elliptic Curves (short paper).- More Constructions of Re-splittable Threshold Public Key Encryption (short paper).- Hardware Security.- How to Effectively Decrease the Resource Requirement in Template Attack?.- Deterministic Hard Fault Attack on Trivium (short paper).- DPA Resilience of Rotation-Symmetric S-boxes.- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering.- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics.- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011.- Improved Linear Cryptanalysis of Reduced-Round MIBS.- Characterization of EME with Linear Mixing.- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper).- Encryption.- Related Key Secure PKE from Hash Proof Systems.- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper).- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper).

Erscheint lt. Verlag 4.8.2014
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XII, 287 p. 62 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 462 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Schlagworte Access Control • authentication • cryptography • Distributed Systems Security • Encryption • formal methods and theory of security • hardware attacks and countermeasures • hardware reverse engineering • hardware security implementation • Intrusion Detection Systems • Key Management • mathematical foundations of cryptography • operating systems security • public key (asymmetric) techniques • Security and Privacy • security in hardware • symmetric cryptography and hash functions • Systems Security • theory of database privacy and security • virtualization and security
ISBN-10 3-319-09842-X / 331909842X
ISBN-13 978-3-319-09842-5 / 9783319098425
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20