Advertisement

Advances in Information and Computer Security

8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings

  • Kazuo Sakiyama
  • Masayuki Terada

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8231)

Table of contents

  1. Front Matter
  2. Software and System Security

    1. Masaya Sato, Toshihiro Yamauchi
      Pages 1-18
    2. Yi Deng, Yang Zhang, Liang Cheng, Xiaoshan Sun
      Pages 19-35
    3. Shotaro Sano, Takuma Otsuka, Hiroshi G. Okuno
      Pages 36-52
    4. José Moreira, Marcel Fernández, Grigory Kabatiansky
      Pages 53-67
  3. Cryptanalysis

    1. Mostafa Taha, Patrick Schaumont
      Pages 68-82
    2. Yusuke Naito, Yu Sasaki, Lei Wang, Kan Yasuda
      Pages 83-98
    3. Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi
      Pages 115-132
  4. Privacy and Cloud Computing

    1. Fu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen, Bao-Shuh Paul Lin
      Pages 133-150
    2. Wakaha Ogata, Keita Koiwa, Akira Kanaoka, Shin’ichiro Matsuo
      Pages 151-167
    3. Paolo Palmieri, Olivier Pereira
      Pages 168-182
    4. Takato Hirano, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda
      Pages 183-200
  5. Public Key Cryptosystems

    1. Yutaro Kiyomura, Tsuyoshi Takagi
      Pages 201-216
    2. Kaoru Kurosawa, Takuma Ueda
      Pages 217-225
    3. Yasufumi Hashimoto
      Pages 244-257
  6. Security Protocols

    1. Rui Xu, Kirill Morozov, Tsuyoshi Takagi
      Pages 258-271
    2. Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka
      Pages 290-302
    3. Haruna Higo, Keisuke Tanaka, Kenji Yasunaga
      Pages 303-318
  7. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in Okinawa, Japan, in November 2013. The 20 revised selected papers presented in this volume were carefully reviewed and selected from 63 submissions. They are organized in topical sections named:
software and system security, cryptanalysis, privacy and cloud computing, public key cryptosystems, and security protocols.

Keywords

algorithms attacks ciphers distributed systems encryption

Editors and affiliations

  • Kazuo Sakiyama
    • 1
  • Masayuki Terada
    • 2
  1. 1.Department of InformaticsThe University of Electro-CommunicationsChofuJapan
  2. 2.Research LaboratoriesNTT DOCOMO, Inc.KanagawaJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-41383-4
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-41382-7
  • Online ISBN 978-3-642-41383-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering