Description |
1 online resource (xii, 285 pages) : illustrations |
Series |
Lecture Notes in Computer Science, 0302-9743 ; 8639 |
|
LNCS sublibrary, SL 4, Security and cryptology |
|
Lecture notes in computer science ; 8639. 1611-3349
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You Threatening my Hazards? -- Complicating Process Identification by Replacing Process Information for Attack Avoidance -- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints -- Key Management for Onion Routing in a True Peer to Peer Setting (short paper) -- Threshold Cryptography -- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication -- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper) -- Secure Multi-party Computation for Elliptic Curves (short paper) -- More Constructions of Re-splittable Threshold Public Key Encryption (short paper) -- Hardware Security -- How to Effectively Decrease the Resource Requirement in Template Attack? -- Deterministic Hard Fault Attack on Trivium (short paper) -- DPA Resilience of Rotation-Symmetric S-boxes -- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering -- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics -- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011 -- Improved Linear Cryptanalysis of Reduced-Round MIBS -- Characterization of EME with Linear Mixing -- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper) -- Encryption -- Related Key Secure PKE from Hash Proof Systems -- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper) -- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper) |
Summary |
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption |
Analysis |
computerwetenschappen |
|
computer sciences |
|
gegevensbeheer |
|
data management |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Notes |
International conference proceedings |
|
Includes author index |
|
English |
|
Online resource; title from PDF title page (SpringerLink, viewed Sep. 3, 2014) |
In |
Springer eBooks |
Subject |
Computer security -- Congresses
|
|
Computer science.
|
|
Computer networks.
|
|
Data protection.
|
|
Data encryption (Computer science)
|
|
Computer software.
|
|
Computational complexity.
|
|
Electronic Data Processing
|
|
Computer Communication Networks
|
|
Software
|
|
software.
|
|
Computational complexity
|
|
Computer networks
|
|
Computer science
|
|
Computer security
|
|
Computer software
|
|
Data encryption (Computer science)
|
|
Data protection
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Yoshida, Maki, editor.
|
|
Mouri, Koichi, editor.
|
ISBN |
9783319098432 |
|
3319098438 |
|