Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings /
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the wo...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2014.
|
Σειρά: | Lecture Notes in Computer Science,
8639 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- System Security
- Privacy-Friendly Access Control Based on Personal Attributes
- Are You Threatening my Hazards?
- Complicating Process Identification by Replacing Process Information for Attack Avoidance
- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints
- Key Management for Onion Routing in a True Peer to Peer Setting (short paper)
- Threshold Cryptography
- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication
- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper)
- Secure Multi-party Computation for Elliptic Curves (short paper)
- More Constructions of Re-splittable Threshold Public Key Encryption (short paper)
- Hardware Security
- How to Effectively Decrease the Resource Requirement in Template Attack?
- Deterministic Hard Fault Attack on Trivium (short paper)
- DPA Resilience of Rotation-Symmetric S-boxes
- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering
- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics
- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011
- Improved Linear Cryptanalysis of Reduced-Round MIBS
- Characterization of EME with Linear Mixing
- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper)
- Encryption
- Related Key Secure PKE from Hash Proof Systems
- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper)
- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper).