04892nam 22008535 450 99646566480331620200704052908.03-642-04846-310.1007/978-3-642-04846-3(CKB)1000000000798284(SSID)ssj0000315988(PQKBManifestationID)11261558(PQKBTitleCode)TC0000315988(PQKBWorkID)10257019(PQKB)11056610(DE-He213)978-3-642-04846-3(MiAaPQ)EBC3064699(PPN)139959041(EXLCZ)99100000000079828420100301d2009 u| 0engurnn|008mamaatxtccrAdvances in Information and Computer Security[electronic resource] 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings /edited by Tsuyoshi Takagi, Masahiro Mambo1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (XII, 229 p.)Security and Cryptology ;5824International conference proceedings.3-642-04845-5 Includes bibliographical references and index.Invited Talk -- The Future of Cryptographic Algorithms -- Block Cipher -- Bit-Free Collision: Application to APOP Attack -- Impossible Boomerang Attack for Block Cipher Structures -- Improved Distinguishing Attacks on HC-256 -- Cryptographic Protocols -- A Generic Construction of Timed-Release Encryption with Pre-open Capability -- An Efficient Identity-Based Signcryption Scheme for Multiple Receivers -- Universal Designated Verifier Signatures with Threshold-Signers -- Reducing Complexity Assumptions for Oblivious Transfer -- Protection and Intrusion Detection -- Tamper-Tolerant Software: Modeling and Implementation -- An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation -- Efficient Intrusion Detection Based on Static Analysis and Stack Walks -- Authentication -- Strongly Secure Authenticated Key Exchange without NAXOS’ Approach -- ID-Based Group Password-Authenticated Key Exchange -- A Proposal of Efficient Remote Biometric Authentication Protocol.This book constitutes the refereed proceedings of the 4th International Workshop on Security, IWSEC 2009, held in Toyama, Japan, in October 2009. The 13 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 46 submissions. The papers are organized in topical sections on block cipher, cryptographic protocols, contents protection and intrusion detection, as well as authentication.Security and Cryptology ;5824Computer securityComputer communication systemsComputer programmingOperating systems (Computers)Management information systemsComputer scienceComputers and civilizationSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Programming Techniqueshttps://scigraph.springernature.com/ontologies/product-market-codes/I14010Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Kongress.swdToyama (2009)swdComputer security.Computer communication systems.Computer programming.Operating systems (Computers).Management information systems.Computer science.Computers and civilization.Systems and Data Security.Computer Communication Networks.Programming Techniques.Operating Systems.Management of Computing and Information Systems.Computers and Society.005.8DAT 465fstubSS 4800rvkTakagi Tsuyoshiedthttp://id.loc.gov/vocabulary/relators/edtMambo Masahiroedthttp://id.loc.gov/vocabulary/relators/edtInternational Workshop on SecurityBOOK996465664803316Advances in Information and Computer Security2030577UNISA