Co-organized by IEICE & IPSJ
IWSEC 2010: 5th International Workshop on Security
November 22-24, 2010
Kobe International Conference Center, Kobe, Japan

IWSEC2010

The 5th International Workshop on Security, IWSEC2010, is held at Kobe International Conference Center, Kobe, Japan, in November 22-24, 2010. The proceedings is as an Springer LNCS (Lecture Notes in Computer Science) volume entitled "Advances in Information and Computer Security".

SpringerLink

Best Paper Award

Margus Niitsoo "Optimal Adversary Behavior for the Serial Model of Financial Attack Trees"

Best Student Paper Award

Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta "A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model"

IWSEC

Conference topics

IWSEC 2010 will select submissions from three tracks, and the review and selection processes of these tracks will be independent of each other. Track III (security in real life applications) is a new track designed to allow researchers and practitioners to share their research and experience. We welcome papers that highlight the practical aspects of security technologies and industrial case studies. Topics of interest for the conference include but are not limited to:


  • Track I: Foundations of Security
    (Track Chair: Noboru Kunihiro, The University of Tokyo, Japan)
    • Authentication
    • Biometrics
    • Block/Stream Ciphers
    • Cryptographic Protocols
    • Cryptanalysis
    • Digital Signatures
    • Hash Functions
    • Information Hiding
    • Public Key Cryptosystems
    • Quantum Security
  • Track II: Security in Networks and Ubiquitous Computing Systems
    (Track Chair: Isao Echizen, National Institute of Informatics, Japan)
    • Network Security
      • Intrusion Detection
      • Malware Detection
      • Security in Sensor Networks
    • Security of Ubiquitous and Cloud Computing
      • Security of Multi-party Computing
      • Authorization and Access Control
      • Mobile Security
    • Privacy Enhancing Technology
      • Anonymity-related Technology
      • Privacy Preserving System
      • Privacy on WEB and DB
    • Software Security
      • Security Architectures
      • Data and System Integrity
      • Reliable Secure Interactions of Services
  • Track III: Security in Real Life Applications
    (Track Chair: Ryoichi Sasaki, Tokyo Denki University, Japan)
    • Secure Living and Working Environments
      • Secure Consumer Electronics
      • RFID Security
    • Security in Commerce and Government
      • DRM
      • Copyright Protection
      • Content Security E-business/e-commerce/e-government Security
    • Security Management
      • Access Control Policies
      • ISMS
    • Protection of Critical Infrastructures
      • Critical Infrastructure Protection
      • Risk Analysis and Risk Management
    • Testing, Verification and Certification
      • Security Verification
      • Assurance
    • Law, Policy, Ethics and Related Technologies
      • Digital Forensics
      • Information Law and Ethics