Advances in Information and Computer Security [electronic resource] : 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings / edited by Maki Yoshida, Koichi Mouri.
Material type:
TextLanguage: English Series: Lecture Notes in Computer Science ; 8639Publication details: Cham : Springer International Publishing, 2014.Description: 1 online resource (XII, 287 p. 62 ill.)ISBN: - 9783319098432
| Item type | Current library | Call number | Materials specified | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
|
|
National Library of India | Available | EBK000025000ENG |
System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You Threatening my Hazards? -- Complicating Process Identification by Replacing Process Information for Attack Avoidance -- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints -- Key Management for Onion Routing in a True Peer to Peer Setting (short paper) -- Threshold Cryptography -- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication -- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper) -- Secure Multi-party Computation for Elliptic Curves (short paper) -- More Constructions of Re-splittable Threshold Public Key Encryption (short paper) -- Hardware Security -- How to Effectively Decrease the Resource Requirement in Template Attack? -- Deterministic Hard Fault Attack on Trivium (short paper) -- DPA Resilience of Rotation-Symmetric S-boxes -- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering -- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics -- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011 -- Improved Linear Cryptanalysis of Reduced-Round MIBS -- Characterization of EME with Linear Mixing -- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper) -- Encryption -- Related Key Secure PKE from Hash Proof Systems -- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper) -- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper).
There are no comments on this title.
