default search action
9. IWSEC 2014: Hirosaki, Japan
- Maki Yoshida, Koichi Mouri:
Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings. Lecture Notes in Computer Science 8639, Springer 2014, ISBN 978-3-319-09842-5
System Security
- Jan Hajny, Lukas Malina, Ondrej Tethal:
Privacy-Friendly Access Control Based on Personal Attributes. 1-16 - Marina Krotofil, Jason Larsen:
Are You Threatening My Hazards? 17-32 - Masaya Sato, Toshihiro Yamauchi:
Complicating Process Identification by Replacing Process Information for Attack Avoidance. 33-47 - Kuniyasu Suzaki, Toshiki Yagi, Kazukuni Kobara, Toshiaki Ishiyama:
Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints. 48-61 - Paolo Palmieri, Johan A. Pouwelse:
Key Management for Onion Routing in a True Peer to Peer Setting. 62-71
Threshold Cryptography
- Rui Xu, Kirill Morozov, Tsuyoshi Takagi:
Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication. 72-87 - Satoshi Obana, Kazuya Tsuchida:
Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field. 88-97 - Koutarou Suzuki, Kazuki Yoneyama:
Secure Multi-Party Computation for Elliptic Curves. 98-108 - Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:
More Constructions of Re-splittable Threshold Public Key Encryption. 109-118
Hardware Security
- Hailong Zhang:
How to Effectively Decrease the Resource Requirement in Template Attack? 119-133 - Avijit Dutta, Goutam Paul:
Deterministic Hard Fault Attack on Trivium. 134-145 - Muhammet Ali Evci, Selçuk Kavut:
DPA Resilience of Rotation-Symmetric S-boxes. 146-157 - Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, Naoya Torii:
A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering. 158-173 - Yun-An Chang, Wei-Chih Hong, Ming-Chun Hsiao, Bo-Yin Yang, An-Yeu Wu, Chen-Mou Cheng:
Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics. 174-186
Foundation
- Kosei Endo, Noboru Kunihiro:
On the Security Proof of an Authentication Protocol from Eurocrypt 2011. 187-203 - Aslí Bay, Jialin Huang, Serge Vaudenay:
Improved Linear Cryptanalysis of Reduced-Round MIBS. 204-220 - Nilanjan Datta, Mridul Nandi:
Characterization of EME with Linear Mixing. 221-239 - Shoichi Akagi, Yasuyuki Nogami:
Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion on Twistable Ate Pairing and Its Difficulty. 240-249
Encryption
- Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei:
Related Key Secure PKE from Hash Proof Systems. 250-265 - Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin:
Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy. 266-275 - Sanjit Chatterjee, Sayantan Mukherjee:
Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data. 276-285
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.