LEADER 01863nas 2200553-a 450 001 996199394403316 005 20240203213017.0 011 $a2992-9431 035 $a(DE-599)ZDB2069650-4 035 $a(OCoLC)38364125 035 $a(CKB)963018223017 035 $a(CONSER)--2010236533 035 $a(EXLCZ)99963018223017 100 $a19980206b19892021 --- a 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAir power history 210 $aWashington, D.C. $cAir Force Historical Foundation 300 $aRefereed/Peer-reviewed 311 $a1044-016X 517 1 $aJournal of the Air Force Historical Foundation 531 $aAIR POWER HISTORY THE JOURNAL OF AIR AND SPACE HISTORY 606 $aAir power$xHistory$vPeriodicals 606 $aAeronautics, Military$zUnited States$xHistory$vPeriodicals 606 $aForces aériennes$xHistoire$vPériodiques 606 $aAéronautique militaire$zÉtats-Unis$xHistoire$vPériodiques 606 $aMilitary History & Science$2ebps 606 $aAeronautics, Military$2fast$3(OCoLC)fst00798542 606 $aAir power$2fast$3(OCoLC)fst00802495 607 $aUnited States$2fast$1https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq 608 $aHistory.$2fast 608 $aPeriodicals.$2fast 615 0$aAir power$xHistory 615 0$aAeronautics, Military$xHistory 615 6$aForces aériennes$xHistoire 615 6$aAéronautique militaire$xHistoire 615 7$aMilitary History & Science. 615 7$aAeronautics, Military. 615 7$aAir power. 676 $a358 676 $a358 712 02$aAir Force Historical Foundation. 906 $aJOURNAL 912 $a996199394403316 996 $aAir power history$93363951 997 $aUNISA LEADER 04404nam 22006615 450 001 9910484349203321 005 20251226200028.0 010 $a3-319-09843-8 024 7 $a10.1007/978-3-319-09843-2 035 $a(CKB)3710000000227363 035 $a(SSID)ssj0001338618 035 $a(PQKBManifestationID)11796819 035 $a(PQKBTitleCode)TC0001338618 035 $a(PQKBWorkID)11344614 035 $a(PQKB)11380483 035 $a(DE-He213)978-3-319-09843-2 035 $a(MiAaPQ)EBC6303294 035 $a(MiAaPQ)EBC5588122 035 $a(Au-PeEL)EBL5588122 035 $a(OCoLC)889743955 035 $a(PPN)180625969 035 $a(EXLCZ)993710000000227363 100 $a20140819d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Information and Computer Security $e9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings /$fedited by Maki Yoshida, Koichi Mouri 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 287 p. 62 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8639 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-09842-X 327 $aSystem Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You Threatening my Hazards? -- Complicating Process Identification by Replacing Process Information for Attack Avoidance -- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints -- Key Management for Onion Routing in a True Peer to Peer Setting (short paper) -- Threshold Cryptography -- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication -- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper) -- Secure Multi-party Computation for Elliptic Curves (short paper) -- More Constructions of Re-splittable Threshold Public Key Encryption (short paper) -- Hardware Security -- How to Effectively Decrease the Resource Requirement in Template Attack? -- Deterministic Hard Fault Attack on Trivium (short paper) -- DPA Resilience of Rotation-Symmetric S-boxes -- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering -- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics -- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011 -- Improved Linear Cryptanalysis of Reduced-Round MIBS -- Characterization of EME with Linear Mixing -- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper) -- Encryption -- Related Key Secure PKE from Hash Proof Systems -- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper) -- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper). 330 $aThis book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8639 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aCryptology 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aCryptology. 676 $a004 702 $aYoshida$b Maki$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMouri$b Koichi$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484349203321 996 $aAdvances in Information and Computer Security$92904912 997 $aUNINA