LEADER 04220nam 22008415 450 001 9910482979003321 005 20251226200151.0 010 $a3-642-04846-3 024 7 $a10.1007/978-3-642-04846-3 035 $a(CKB)1000000000798284 035 $a(SSID)ssj0000315988 035 $a(PQKBManifestationID)11261558 035 $a(PQKBTitleCode)TC0000315988 035 $a(PQKBWorkID)10257019 035 $a(PQKB)11056610 035 $a(DE-He213)978-3-642-04846-3 035 $a(MiAaPQ)EBC3064699 035 $a(PPN)139959041 035 $a(EXLCZ)991000000000798284 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Information and Computer Security $e4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings /$fedited by Tsuyoshi Takagi, Masahiro Mambo 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XII, 229 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5824 300 $aInternational conference proceedings. 311 08$a3-642-04845-5 320 $aIncludes bibliographical references and index. 327 $aInvited Talk -- The Future of Cryptographic Algorithms -- Block Cipher -- Bit-Free Collision: Application to APOP Attack -- Impossible Boomerang Attack for Block Cipher Structures -- Improved Distinguishing Attacks on HC-256 -- Cryptographic Protocols -- A Generic Construction of Timed-Release Encryption with Pre-open Capability -- An Efficient Identity-Based Signcryption Scheme for Multiple Receivers -- Universal Designated Verifier Signatures with Threshold-Signers -- Reducing Complexity Assumptions for Oblivious Transfer -- Protection and Intrusion Detection -- Tamper-Tolerant Software: Modeling and Implementation -- An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation -- Efficient Intrusion Detection Based on Static Analysis and Stack Walks -- Authentication -- Strongly Secure Authenticated Key Exchange without NAXOS? Approach -- ID-Based Group Password-Authenticated Key Exchange -- A Proposal of Efficient Remote Biometric Authentication Protocol. 330 $aThis book constitutes the refereed proceedings of the 4th International Workshop on Security, IWSEC 2009, held in Toyama, Japan, in October 2009. The 13 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 46 submissions. The papers are organized in topical sections on block cipher, cryptographic protocols, contents protection and intrusion detection, as well as authentication. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5824 606 $aData protection 606 $aComputer networks 606 $aComputer programming 606 $aOperating systems (Computers) 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aProgramming Techniques 606 $aOperating Systems 606 $aIT Operations 606 $aComputers and Society 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer programming. 615 0$aOperating systems (Computers). 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aProgramming Techniques. 615 24$aOperating Systems. 615 24$aIT Operations. 615 24$aComputers and Society. 676 $a005.8 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 701 $aMambo$b Masahiro$01751564 701 $aTakagi$b Tsuyoshi$01354919 712 12$aInternational Workshop on Security. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910482979003321 996 $aAdvances in Information and Computer Security$94186555 997 $aUNINA