Advertisement

Advances in Information and Computer Security

6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings

  • Tetsu Iwata
  • Masakatsu Nishigaki

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7038)

Table of contents

  1. Front Matter
  2. Software Protection and Reliability

  3. Cryptographic Protocol

  4. Pairing and Identity-Based Signature

    1. Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto
      Pages 65-78
    2. S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
      Pages 79-95
  5. Malware Detection

    1. Jonas Pfoh, Christian Schneider, Claudia Eckert
      Pages 96-112
    2. Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis
      Pages 113-128
    3. Maryam Shojaei, Naser Movahhedinia, Behrouz Tork Ladani
      Pages 129-143
  6. Mathematical and Symmetric Cryptography

    1. Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata
      Pages 144-160
    2. Goutam Paul, Subhamoy Maitra, Shashwat Raizada
      Pages 161-177
    3. Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, Kazuo Ohta
      Pages 178-192
  7. Public Key Encryption

    1. Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote
      Pages 193-209
    2. Ryotaro Hayashi, Tatsuyuki Matsushita, Takuya Yoshida, Yoshihiro Fujii, Koji Okada
      Pages 210-229
  8. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The 14 revised full papers presented in this volume were carefully reviewed and selected from 45 submissions. They address all current issues in information and computer security such as foundations of security, security in networks and ubiquitous computing systems, and security in real life applications. The papers are organized in topical sections on software protection and reliability; cryptographic protocol; pairing and identity based signature; malware detection; mathematical and symmetric cryptography; public key encryption.

Editors and affiliations

  • Tetsu Iwata
    • 1
  • Masakatsu Nishigaki
    • 2
  1. 1.Dept. of Computational Science and EngineeringNagoya UniversityChikusa-kuJapan
  2. 2.Graduate School of Science and TechnologyShizuoka UniversityNakaJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-25141-2
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-25140-5
  • Online ISBN 978-3-642-25141-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering