LEADER 04892nam 22008535 450 001 996465664803316 005 20200704052908.0 010 $a3-642-04846-3 024 7 $a10.1007/978-3-642-04846-3 035 $a(CKB)1000000000798284 035 $a(SSID)ssj0000315988 035 $a(PQKBManifestationID)11261558 035 $a(PQKBTitleCode)TC0000315988 035 $a(PQKBWorkID)10257019 035 $a(PQKB)11056610 035 $a(DE-He213)978-3-642-04846-3 035 $a(MiAaPQ)EBC3064699 035 $a(PPN)139959041 035 $a(EXLCZ)991000000000798284 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Information and Computer Security$b[electronic resource] $e4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings /$fedited by Tsuyoshi Takagi, Masahiro Mambo 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XII, 229 p.) 225 1 $aSecurity and Cryptology ;$v5824 300 $aInternational conference proceedings. 311 $a3-642-04845-5 320 $aIncludes bibliographical references and index. 327 $aInvited Talk -- The Future of Cryptographic Algorithms -- Block Cipher -- Bit-Free Collision: Application to APOP Attack -- Impossible Boomerang Attack for Block Cipher Structures -- Improved Distinguishing Attacks on HC-256 -- Cryptographic Protocols -- A Generic Construction of Timed-Release Encryption with Pre-open Capability -- An Efficient Identity-Based Signcryption Scheme for Multiple Receivers -- Universal Designated Verifier Signatures with Threshold-Signers -- Reducing Complexity Assumptions for Oblivious Transfer -- Protection and Intrusion Detection -- Tamper-Tolerant Software: Modeling and Implementation -- An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation -- Efficient Intrusion Detection Based on Static Analysis and Stack Walks -- Authentication -- Strongly Secure Authenticated Key Exchange without NAXOS? Approach -- ID-Based Group Password-Authenticated Key Exchange -- A Proposal of Efficient Remote Biometric Authentication Protocol. 330 $aThis book constitutes the refereed proceedings of the 4th International Workshop on Security, IWSEC 2009, held in Toyama, Japan, in October 2009. The 13 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 46 submissions. The papers are organized in topical sections on block cipher, cryptographic protocols, contents protection and intrusion detection, as well as authentication. 410 0$aSecurity and Cryptology ;$v5824 606 $aComputer security 606 $aComputer communication systems 606 $aComputer programming 606 $aOperating systems (Computers) 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aProgramming Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/I14010 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 608 $aKongress.$2swd 608 $aToyama (2009)$2swd 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aComputer programming. 615 0$aOperating systems (Computers). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aProgramming Techniques. 615 24$aOperating Systems. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 676 $a005.8 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aTakagi$b Tsuyoshi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMambo$b Masahiro$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Workshop on Security 906 $aBOOK 912 $a996465664803316 996 $aAdvances in Information and Computer Security$92030577 997 $aUNISA