Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iwsec/iwsec2014.bht:"
@inproceedings{DBLP:conf/iwsec/AkagiN14, author = {Shoichi Akagi and Yasuyuki Nogami}, editor = {Maki Yoshida and Koichi Mouri}, title = {Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion on Twistable Ate Pairing and Its Difficulty}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {240--249}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_18}, doi = {10.1007/978-3-319-09843-2\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AkagiN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/BayHV14, author = {Asl{\'{\i}} Bay and Jialin Huang and Serge Vaudenay}, editor = {Maki Yoshida and Koichi Mouri}, title = {Improved Linear Cryptanalysis of Reduced-Round {MIBS}}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {204--220}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_16}, doi = {10.1007/978-3-319-09843-2\_16}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/BayHV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ChangHHYWC14, author = {Yun{-}An Chang and Wei{-}Chih Hong and Ming{-}Chun Hsiao and Bo{-}Yin Yang and An{-}Yeu Wu and Chen{-}Mou Cheng}, editor = {Maki Yoshida and Koichi Mouri}, title = {Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {174--186}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_14}, doi = {10.1007/978-3-319-09843-2\_14}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ChangHHYWC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ChatterjeeM14, author = {Sanjit Chatterjee and Sayantan Mukherjee}, editor = {Maki Yoshida and Koichi Mouri}, title = {Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {276--285}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_21}, doi = {10.1007/978-3-319-09843-2\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ChatterjeeM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DattaN14, author = {Nilanjan Datta and Mridul Nandi}, editor = {Maki Yoshida and Koichi Mouri}, title = {Characterization of {EME} with Linear Mixing}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {221--239}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_17}, doi = {10.1007/978-3-319-09843-2\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/DattaN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DuttaP14, author = {Avijit Dutta and Goutam Paul}, editor = {Maki Yoshida and Koichi Mouri}, title = {Deterministic Hard Fault Attack on Trivium}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {134--145}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_11}, doi = {10.1007/978-3-319-09843-2\_11}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DuttaP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/EndoK14, author = {Kosei Endo and Noboru Kunihiro}, editor = {Maki Yoshida and Koichi Mouri}, title = {On the Security Proof of an Authentication Protocol from Eurocrypt 2011}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {187--203}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_15}, doi = {10.1007/978-3-319-09843-2\_15}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/EndoK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/EvciK14, author = {Muhammet Ali Evci and Sel{\c{c}}uk Kavut}, editor = {Maki Yoshida and Koichi Mouri}, title = {{DPA} Resilience of Rotation-Symmetric S-boxes}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {146--157}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_12}, doi = {10.1007/978-3-319-09843-2\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/EvciK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HajnyMT14, author = {Jan Hajny and Lukas Malina and Ondrej Tethal}, editor = {Maki Yoshida and Koichi Mouri}, title = {Privacy-Friendly Access Control Based on Personal Attributes}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {1--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_1}, doi = {10.1007/978-3-319-09843-2\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/HajnyMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JiaLLM14, author = {Dingding Jia and Bao Li and Xianhui Lu and Qixiang Mei}, editor = {Maki Yoshida and Koichi Mouri}, title = {Related Key Secure {PKE} from Hash Proof Systems}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {250--265}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_19}, doi = {10.1007/978-3-319-09843-2\_19}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JiaLLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KrotofilL14, author = {Marina Krotofil and Jason Larsen}, editor = {Maki Yoshida and Koichi Mouri}, title = {Are You Threatening My Hazards?}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {17--32}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_2}, doi = {10.1007/978-3-319-09843-2\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KrotofilL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ObanaT14, author = {Satoshi Obana and Kazuya Tsuchida}, editor = {Maki Yoshida and Koichi Mouri}, title = {Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {88--97}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_7}, doi = {10.1007/978-3-319-09843-2\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ObanaT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Ohata0HM14, author = {Satsuya Ohata and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura}, editor = {Maki Yoshida and Koichi Mouri}, title = {More Constructions of Re-splittable Threshold Public Key Encryption}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {109--118}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_9}, doi = {10.1007/978-3-319-09843-2\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Ohata0HM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PalmieriP14, author = {Paolo Palmieri and Johan A. Pouwelse}, editor = {Maki Yoshida and Koichi Mouri}, title = {Key Management for Onion Routing in a True Peer to Peer Setting}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {62--71}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_5}, doi = {10.1007/978-3-319-09843-2\_5}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/PalmieriP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SatoY14, author = {Masaya Sato and Toshihiro Yamauchi}, editor = {Maki Yoshida and Koichi Mouri}, title = {Complicating Process Identification by Replacing Process Information for Attack Avoidance}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {33--47}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_3}, doi = {10.1007/978-3-319-09843-2\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SatoY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SuzakiYKI14, author = {Kuniyasu Suzaki and Toshiki Yagi and Kazukuni Kobara and Toshiaki Ishiyama}, editor = {Maki Yoshida and Koichi Mouri}, title = {Kernel Memory Protection by an Insertable Hypervisor Which Has {VM} Introspection and Stealth Breakpoints}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {48--61}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_4}, doi = {10.1007/978-3-319-09843-2\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SuzakiYKI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SuzukiY14, author = {Koutarou Suzuki and Kazuki Yoneyama}, editor = {Maki Yoshida and Koichi Mouri}, title = {Secure Multi-Party Computation for Elliptic Curves}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {98--108}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_8}, doi = {10.1007/978-3-319-09843-2\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SuzukiY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TsengCL14, author = {Fu{-}Kuo Tseng and Rong{-}Jaye Chen and Bao{-}Shuh Paul Lin}, editor = {Maki Yoshida and Koichi Mouri}, title = {Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {266--275}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_20}, doi = {10.1007/978-3-319-09843-2\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TsengCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XuMT14, author = {Rui Xu and Kirill Morozov and Tsuyoshi Takagi}, editor = {Maki Yoshida and Koichi Mouri}, title = {Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {72--87}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_6}, doi = {10.1007/978-3-319-09843-2\_6}, timestamp = {Mon, 06 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XuMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YamamotoTST14, author = {Dai Yamamoto and Masahiko Takenaka and Kazuo Sakiyama and Naoya Torii}, editor = {Maki Yoshida and Koichi Mouri}, title = {A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {158--173}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_13}, doi = {10.1007/978-3-319-09843-2\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YamamotoTST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Zhang14, author = {Hailong Zhang}, editor = {Maki Yoshida and Koichi Mouri}, title = {How to Effectively Decrease the Resource Requirement in Template Attack?}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {119--133}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_10}, doi = {10.1007/978-3-319-09843-2\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Zhang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2014, editor = {Maki Yoshida and Koichi Mouri}, title = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2}, doi = {10.1007/978-3-319-09843-2}, isbn = {978-3-319-09842-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.