Advances in Information and Computer Security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings

Author:   Tsuyoshi Takagi ,  Masahiro Mambo
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2009 ed.
Volume:   5824
ISBN:  

9783642048456


Pages:   229
Publication Date:   05 October 2009
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $190.08 Quantity:  
Add to Cart

Share |

Advances in Information and Computer Security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings


Add your own review!

Overview

The Fourth International Workshop on Security (IWSEC 2009) was held at Toyama International Conference Center, Toyama, Japan, October 28–30, 2009. The workshop was co-organized by CSEC, a special interest group on computer security of the IPSJ (Information Processing Society of Japan) and ISEC, a technical group on information security of IEICE (The Institute of Electronics, Information and Communication Engineers). The excellent Local Organizing Committee was led by the IWSEC 2009 General Co-chairs, Kazuo Takaragi and Hiroaki Kikuchi. IWSEC2009received46papersubmissionsfromallovertheworld.Wewould like to thank all the authors who submitted papers. Eachpaper was reviewedby at least three reviewers. In addition to the Program Committee members, many externalreviewersjoinedthereviewprocessintheirparticularareasofexpertise. We were fortunate to have this energetic team of experts, and are grateful to all of them for their hard work. The hard work includes very active discussion; the discussion phase was almost as long as the initial individual reviewing. The review and discussion were supported by a very nice Web-based system, iChair. We thank its developers. Following the review phases, 13 papers were accepted for publication in this volume of Advances in Information and Computer Security. Together with the contributed papers, the workshop featured an invited talk and a hash function panel both of which were respectively given and chaired by eminent researcher, Bart Preneel (Katholieke Universiteit Leuven). An abstract of the talk, titled “TheFutureofCryptographicAlgorithms,”isincludedinthisvolume.Wedeeply appreciate his contribution. Many people contributed to the success of IWSEC 2009. We wish to - press our deep appreciation for their contribution to informationand computer security.

Full Product Details

Author:   Tsuyoshi Takagi ,  Masahiro Mambo
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2009 ed.
Volume:   5824
Dimensions:   Width: 15.50cm , Height: 1.30cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9783642048456


ISBN 10:   3642048455
Pages:   229
Publication Date:   05 October 2009
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Invited Talk.- The Future of Cryptographic Algorithms.- Block Cipher.- Bit-Free Collision: Application to APOP Attack.- Impossible Boomerang Attack for Block Cipher Structures.- Improved Distinguishing Attacks on HC-256.- Cryptographic Protocols.- A Generic Construction of Timed-Release Encryption with Pre-open Capability.- An Efficient Identity-Based Signcryption Scheme for Multiple Receivers.- Universal Designated Verifier Signatures with Threshold-Signers.- Reducing Complexity Assumptions for Oblivious Transfer.- Protection and Intrusion Detection.- Tamper-Tolerant Software: Modeling and Implementation.- An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation.- Efficient Intrusion Detection Based on Static Analysis and Stack Walks.- Authentication.- Strongly Secure Authenticated Key Exchange without NAXOS’ Approach.- ID-Based Group Password-Authenticated Key Exchange.- A Proposal of Efficient Remote Biometric Authentication Protocol.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List