LEADER 03974nam 2200613 a 450 001 9910483784003321 005 20200520144314.0 010 $a3-642-16825-6 024 7 $a10.1007/978-3-642-16825-3 035 $a(CKB)2670000000056660 035 $a(SSID)ssj0000446252 035 $a(PQKBManifestationID)11297657 035 $a(PQKBTitleCode)TC0000446252 035 $a(PQKBWorkID)10491953 035 $a(PQKB)10407319 035 $a(DE-He213)978-3-642-16825-3 035 $a(MiAaPQ)EBC3066070 035 $a(PPN)149890427 035 $a(EXLCZ)992670000000056660 100 $a20101207d2010 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in information and computer security $e5th International Workshop on Security, IWSEC 2010 : Kobe, Japan, November 22-24, 2010 : proceedings /$fIsao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.) 205 $a1st ed. 2010. 210 $aBerlin $cSpringer$d2010 215 $a1 online resource (XIII, 371 p. 83 illus.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v6434 225 1 $aLNCS sublibrary. SL 4, Security and cryptology 300 $aIndex unnumbered. 311 $a3-642-16824-8 320 $aIncludes bibliographical references and index. 327 $aInvited talks -- Encryption -- Data and Web security -- Protocols -- Network security -- Block cipher -- Implementation and real life security. 330 $aThe Fifth International Workshop on Security (IWSEC 2010) was held at Kobe InternationalConferenceCenter,Kobe,Japan,November22?24,2010. Thewo- shop was co-organized by CSEC, a special interest group concerned with the computer security of the Information Processing Society of Japan (IPSJ) and ISEC,atechnicalgroupconcernedwiththe informationsecurityofTheInstitute of Electronics, Information and Communication Engineers (IEICE). The exc- lentLocalOrganizingCommitteewasledbytheIWSEC2010GeneralCo-chairs, Hiroaki Kikuchi and Toru Fujiwara. This year IWSEC 2010 had three tracks, the Foundations of Security (Track I), Security in Networks and Ubiquitous Computing Systems (Track II), and Security in Real Life Applications (Track III), and the review and selection processes for these tracks were independent of each other. We received 75 paper submissions including 44 submissions for Track I, 20 submissions for Track II, and 11 submissions for Track III. We would like to thank all the authors who submitted papers. Each paper was reviewed by at least three reviewers. In - dition to the Program Committee members, many external reviewers joined the review process from their particular areas of expertise. We were fortunate to have this energetic team of experts, and are grateful to all of them for their hard work. This hard work included very active discussions; the discussion phase was almost as long as the initial individual reviewing. The review and discussions weresupportedbyaveryniceWeb-basedsystem,iChair. Wewouldliketothank its developers. Following the review phases, 22 papers including 13 papers for Track I, 6 papers for Track II, and 3 papers for Track III were accepted for publication in this volume of Advances in Information and Computer Security. 410 0$aLecture notes in computer science ;$v6434. 410 0$aLNCS sublibrary.$nSL 4,$pSecurity and cryptology. 606 $aComputer security$vCongresses 606 $aComputers$xAccess control$vCongresses 615 0$aComputer security 615 0$aComputers$xAccess control 676 $a005.8 701 $aEchizen$b Isao$01757900 701 $aKunihiro$b Noboru$01757901 701 $aSasaki$b Ryoichi$01757902 712 12$aInternational Workshop on Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483784003321 996 $aAdvances in information and computer security$94195916 997 $aUNINA