TY - BOOK AU - Yoshida,Maki AU - Mouri,Koichi ED - International Workshop on Security TI - Advances in information and computer security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings T2 - Lecture Notes in Computer Science, SN - 9783319098432 AV - QA76.9.A25 U1 - 005.8 23 PY - 2014///] CY - Cham PB - Springer KW - Computer security KW - Congresses KW - Computer science KW - Computer networks KW - Data protection KW - Data encryption (Computer science) KW - Computer software KW - Computational complexity KW - Electronic Data Processing KW - Computer Communication Networks KW - Software KW - Sécurité informatique KW - Congrès KW - Informatique KW - Réseaux d'ordinateurs KW - Protection de l'information (Informatique) KW - Chiffrement (Informatique) KW - Logiciels KW - Complexité de calcul (Informatique) KW - software KW - aat KW - fast KW - computerwetenschappen KW - computer sciences KW - gegevensbeheer KW - data management KW - Information and Communication Technology (General) KW - Informatie- en communicatietechnologie (algemeen) KW - Congress KW - proceedings (reports) KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - International conference proceedings; Includes author index; System Security -- Privacy-Friendly Access Control Based on Personal Attributes -- Are You Threatening my Hazards? -- Complicating Process Identification by Replacing Process Information for Attack Avoidance -- Kernel Memory Protection by an Insertable Hypervisor which has VM Introspection and Stealth Breakpoints -- Key Management for Onion Routing in a True Peer to Peer Setting (short paper) -- Threshold Cryptography -- Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication -- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field (short paper) -- Secure Multi-party Computation for Elliptic Curves (short paper) -- More Constructions of Re-splittable Threshold Public Key Encryption (short paper) -- Hardware Security -- How to Effectively Decrease the Resource Requirement in Template Attack? -- Deterministic Hard Fault Attack on Trivium (short paper) -- DPA Resilience of Rotation-Symmetric S-boxes -- A Technique using PUFs for protecting circuit layout designs against Reverse Engineering -- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics -- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011 -- Improved Linear Cryptanalysis of Reduced-Round MIBS -- Characterization of EME with Linear Mixing -- Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty (short paper) -- Encryption -- Related Key Secure PKE from Hash Proof Systems -- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy (short paper) -- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (short paper) N2 - This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption UR - https://link.springer.com/10.1007/978-3-319-09843-2 ER -