Advertisement

Advances in Information and Computer Security

12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedings

  • Satoshi Obana
  • Koji Chida

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10418)

Also part of the Security and Cryptology book sub series (LNSC, volume 10418)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Post-quantum Cryptography

    1. Front Matter
      Pages 1-1
    2. Akinori Hosoyamada, Kazumaro Aoki
      Pages 3-18
    3. Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang
      Pages 19-35
  3. System Security (1)

    1. Front Matter
      Pages 37-37
    2. Ahto Buldas, Aleksandr Lenin, Jan Willemson, Anton Charnamord
      Pages 39-55
  4. Public Key Cryptosystems (1)

    1. Front Matter
      Pages 67-67
    2. Rui Zhang, Kai He
      Pages 69-84
    3. Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Tarunpreet Bhatia, Olivier Markowitch
      Pages 85-101
  5. System Security (2)

    1. Front Matter
      Pages 103-103
    2. Nasser Mohammed Al-Fannah, Wanpeng Li
      Pages 105-120
    3. Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai
      Pages 121-137
  6. Cryptanalysis

    1. Front Matter
      Pages 139-139
    2. Rui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto
      Pages 159-178
  7. Cryptographic Protocols

  8. Public Key Cryptosystems (2)

    1. Front Matter
      Pages 213-213
  9. Back Matter
    Pages 243-243

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 12th International Workshop on Security, IWSEC 2017, held in Hiroshima, Japan, in August/September 2017. 

The 11 regular papers and 3 short papers presented in this volume were carefully reviewed and selected from 37 submissions. They were organized in topical sections named: post-quantum cryptography; system security; public key cryptosystems; cryptanalysis; and cryptographic protocols.

Keywords

Big Data Analysis for Security Critical Infrastructure Security Cryptanalysis Cryptographic Protocols Cyber Security Economics Digital Forensics Enriched Cryptography Financial Security Formal Methods Information Law and Ethics IoT Security Machine Learning for Security Malware Countermeasures Measurements for Cyber Security Multiparty Computation Post Quantum Cryptography Privacy Preserving Rational Cryptography Real World Cryptography Security Management

Editors and affiliations

  1. 1.Hosei UniversityTokyoJapan
  2. 2.NTT CorporationTokyoJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-64200-0
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-64199-7
  • Online ISBN 978-3-319-64200-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering