LEADER 04494nam 22006375 450 001 996202532203316 005 20200630201944.0 010 $a3-319-09843-8 024 7 $a10.1007/978-3-319-09843-2 035 $a(CKB)3710000000227363 035 $a(SSID)ssj0001338618 035 $a(PQKBManifestationID)11796819 035 $a(PQKBTitleCode)TC0001338618 035 $a(PQKBWorkID)11344614 035 $a(PQKB)11380483 035 $a(DE-He213)978-3-319-09843-2 035 $a(MiAaPQ)EBC6303294 035 $a(MiAaPQ)EBC5588122 035 $a(Au-PeEL)EBL5588122 035 $a(OCoLC)889743955 035 $a(PPN)180625969 035 $a(EXLCZ)993710000000227363 100 $a20140819d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Information and Computer Security$b[electronic resource] $e9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings /$fedited by Maki Yoshida, Koichi Mouri 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 287 p. 62 illus.) 225 1 $aSecurity and Cryptology ;$v8639 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-09842-X 327 $aSystem Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You Threatening my Hazards? -- Complicating Process Identification by Replacing Process Information for Attack Avoidance -- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints -- Key Management for Onion Routing in a True Peer to Peer Setting (short paper) -- Threshold Cryptography -- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication -- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper) -- Secure Multi-party Computation for Elliptic Curves (short paper) -- More Constructions of Re-splittable Threshold Public Key Encryption (short paper) -- Hardware Security -- How to Effectively Decrease the Resource Requirement in Template Attack? -- Deterministic Hard Fault Attack on Trivium (short paper) -- DPA Resilience of Rotation-Symmetric S-boxes -- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering -- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics -- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011 -- Improved Linear Cryptanalysis of Reduced-Round MIBS -- Characterization of EME with Linear Mixing -- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper) -- Encryption -- Related Key Secure PKE from Hash Proof Systems -- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper) -- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper). 330 $aThis book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption. 410 0$aSecurity and Cryptology ;$v8639 606 $aComputer security 606 $aData encryption (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 14$aSystems and Data Security. 615 24$aCryptology. 676 $a004 702 $aYoshida$b Maki$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMouri$b Koichi$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996202532203316 996 $aAdvances in Information and Computer Security$92030577 997 $aUNISA