Franklin

Advances in Information and Computer Security [electronic resource] : 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings / edited by Tsuyoshi Takagi, Masahiro Mambo.

Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Format/Description:
Book
1 online resource (XII, 229 pages)
Edition:
1st ed. 2009.
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology SL 4, 5824
Security and Cryptology ; 5824
Contained In:
Springer eBooks
Status/Location:
Loading...

Options
Location Notes Your Loan Policy

Details

Subjects:
Computer security.
Computer networks.
Computer programming.
Operating systems (Computers).
Management information systems.
Computer science.
Computers and civilization.
Local subjects:
Systems and Data Security. (search)
Computer Communication Networks. (search)
Programming Techniques. (search)
Operating Systems. (search)
Management of Computing and Information Systems. (search)
Computers and Society. (search)
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the 4th International Workshop on Security, IWSEC 2009, held in Toyama, Japan, in October 2009. The 13 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 46 submissions. The papers are organized in topical sections on block cipher, cryptographic protocols, contents protection and intrusion detection, as well as authentication.
Contents:
Invited Talk
The Future of Cryptographic Algorithms
Block Cipher
Bit-Free Collision: Application to APOP Attack
Impossible Boomerang Attack for Block Cipher Structures
Improved Distinguishing Attacks on HC-256
Cryptographic Protocols
A Generic Construction of Timed-Release Encryption with Pre-open Capability
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
Universal Designated Verifier Signatures with Threshold-Signers
Reducing Complexity Assumptions for Oblivious Transfer
Protection and Intrusion Detection
Tamper-Tolerant Software: Modeling and Implementation
An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation
Efficient Intrusion Detection Based on Static Analysis and Stack Walks
Authentication
Strongly Secure Authenticated Key Exchange without NAXOS' Approach
ID-Based Group Password-Authenticated Key Exchange
A Proposal of Efficient Remote Biometric Authentication Protocol.
Contributor:
Takagi, Tsuyoshi. editor., Editor,
Mambo, Masahiro. editor., Editor,
SpringerLink (Online service)
Other format:
Printed edition:
Printed edition:
ISBN:
978-3-642-04846-3
9783642048463
Publisher Number:
10.1007/978-3-642-04846-3 doi
Access Restriction:
Restricted for use by site license.