Advances in Information and Computer Security

9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

  • Maki Yoshida
  • Koichi Mouri
Conference proceedings IWSEC 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8639)

Table of contents

  1. Front Matter
  2. System Security

    1. Jan Hajny, Lukas Malina, Ondrej Tethal
      Pages 1-16
    2. Marina Krotofil, Jason Larsen
      Pages 17-32
    3. Kuniyasu Suzaki, Toshiki Yagi, Kazukuni Kobara, Toshiaki Ishiyama
      Pages 48-61
    4. Paolo Palmieri, Johan Pouwelse
      Pages 62-71
  3. Threshold Cryptography

    1. Rui Xu, Kirill Morozov, Tsuyoshi Takagi
      Pages 72-87
    2. Koutarou Suzuki, Kazuki Yoneyama
      Pages 98-108
    3. Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura
      Pages 109-118
  4. Hardware Security

    1. Avijit Dutta, Goutam Paul
      Pages 134-145
    2. Muhammet Ali Evci, Selçuk Kavut
      Pages 146-157
    3. Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, Naoya Torii
      Pages 158-173
    4. Yun-An Chang, Wei-Chih Hong, Ming-Chun Hsiao, Bo-Yin Yang, An-Yeu Wu, Chen-Mou Cheng
      Pages 174-186
  5. Foundation

  6. Encryption

    1. Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei
      Pages 250-265
    2. Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin
      Pages 266-275
    3. Sanjit Chatterjee, Sayantan Mukherjee
      Pages 276-285
  7. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014.
The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.


access control authentication cryptography distributed systems security encryption formal methods and theory of security hardware attacks and countermeasures hardware reverse engineering hardware security implementation intrusion detection systems key management mathematical foundations of cryptography operating systems security public key (asymmetric) techniques security and privacy security in hardware symmetric cryptography and hash functions systems security theory of database privacy and security virtualization and security

Editors and affiliations

  • Maki Yoshida
    • 1
  • Koichi Mouri
    • 2
  1. 1.Network Security Research InstituteNational Institute of Information and Communications Technology (NICT)KoganeiJapan
  2. 2.College of Information Science and EngineeringRitsumeikan UniversityKusatsuJapan

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-09842-5
  • Online ISBN 978-3-319-09843-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment