Editors:
Fast track conference proceeding
Unique visibility
State of the art research
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6434)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): IWSEC: International Workshop on Security
Conference proceedings info: IWSEC 2010.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (24 papers)
-
Front Matter
About this book
Keywords
- anonymity
- asymmetric encryption
- authentication
- computer security
- cryptanalysis
- cryptology
- data outsourcing
- digital signatures
- efficient decryption
- elliptic curve cryptography
- group signature
- higher-order statistics
- identity-based encryption
- information security
- network security
Editors and Affiliations
-
National Institute of Informatics, Chiyoda-ku, Japan
Isao Echizen
-
School of Frontier Sciences, Department of Complexity Science and Engineering, University of Tokyo, Chiba, Japan
Noboru Kunihiro
-
School of Science and Technology for Future Life, Department of Information Systems and Multi Media, Tokyo Denki University, Chiyoda-ku, Japan
Ryoichi Sasaki
Bibliographic Information
Book Title: Advances in Information and Computer Security
Book Subtitle: 5th International Worshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010, Proceedings
Editors: Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-16825-3
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Berlin Heidelberg 2010
Softcover ISBN: 978-3-642-16824-6Published: 29 October 2010
eBook ISBN: 978-3-642-16825-3Published: 01 November 2010
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 371
Number of Illustrations: 83 b/w illustrations
Topics: User Interfaces and Human Computer Interaction, Computers and Society, Programming Techniques, Data and Information Security, IT Operations, Cryptology