LEADER 03642nam 2200661Ia 450 001 9910482979003321 005 20200520144314.0 010 $a3-642-04846-3 024 7 $a10.1007/978-3-642-04846-3 035 $a(CKB)1000000000798284 035 $a(SSID)ssj0000315988 035 $a(PQKBManifestationID)11261558 035 $a(PQKBTitleCode)TC0000315988 035 $a(PQKBWorkID)10257019 035 $a(PQKB)11056610 035 $a(DE-He213)978-3-642-04846-3 035 $a(MiAaPQ)EBC3064699 035 $a(PPN)139959041 035 $a(EXLCZ)991000000000798284 100 $a20091230d2009 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Information and Computer Security $e4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 ; Proceedings /$fTsuyoshi Takagi, Masahiro Mambo (eds.) 205 $a1st ed. 2009. 210 $aBerlin ;$aHeidelberg $cSpringer-Verlag$dc2009 215 $a1 online resource (XII, 229 p.) 225 1 $aLecture notes in computer science ;$v5824 300 $aInternational conference proceedings. 311 $a3-642-04845-5 320 $aIncludes bibliographical references and index. 327 $aInvited Talk -- The Future of Cryptographic Algorithms -- Block Cipher -- Bit-Free Collision: Application to APOP Attack -- Impossible Boomerang Attack for Block Cipher Structures -- Improved Distinguishing Attacks on HC-256 -- Cryptographic Protocols -- A Generic Construction of Timed-Release Encryption with Pre-open Capability -- An Efficient Identity-Based Signcryption Scheme for Multiple Receivers -- Universal Designated Verifier Signatures with Threshold-Signers -- Reducing Complexity Assumptions for Oblivious Transfer -- Protection and Intrusion Detection -- Tamper-Tolerant Software: Modeling and Implementation -- An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation -- Efficient Intrusion Detection Based on Static Analysis and Stack Walks -- Authentication -- Strongly Secure Authenticated Key Exchange without NAXOS? Approach -- ID-Based Group Password-Authenticated Key Exchange -- A Proposal of Efficient Remote Biometric Authentication Protocol. 330 $aThis book constitutes the refereed proceedings of the 4th International Workshop on Security, IWSEC 2009, held in Toyama, Japan, in October 2009. The 13 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 46 submissions. The papers are organized in topical sections on block cipher, cryptographic protocols, contents protection and intrusion detection, as well as authentication. 410 0$aLecture notes in computer science ;$v5824. 517 3 $aIWSEC 2009 606 $aComputer networks$xSecurity measures$vCongresses 606 $aComputer security$vCongresses 606 $aComputers$xAccess control$vCongresses 606 $aData encryption (Computer science)$vCongresses 615 0$aComputer networks$xSecurity measures 615 0$aComputer security 615 0$aComputers$xAccess control 615 0$aData encryption (Computer science) 676 $a005.8 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 701 $aMambo$b Masahiro$01751564 701 $aTakagi$b Tsuyoshi$01354919 712 12$aInternational Workshop on Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910482979003321 996 $aAdvances in Information and Computer Security$94186555 997 $aUNINA