Jointly organized by IEICE & IPSJ
November 7-9, 2012
Nishijin Plaza, Kyushu University, Fukuoka, Japan


The 7th International Workshop on Security, IWSEC2012, was held at Nishijin Plaza, Kyushu University, Fukuoka, Japan, between 7-9 November, 2012. The proceedings were published as the Springer LNCS (Lecture Notes in Computer Science) volume entitled "Advances in Information and Computer Security".

Best Paper Award

Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, and Kazuo Ohta, "Boomerang Distinguishers for Full HAS-160 Compression Function"

Best Student Paper Award

Susumu Kiyoshima, Yoshifumi Manabe, and Tatsuaki Okamoto, "Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security"

What's New

March 25, 2013

Invited Talks

Presentation material is released.
"Challenges for making scalable security management for information and communication infrastructure", Suguru Yamaguchi

IWSEC Cup 2012

Conference topics

Original papers on the research and development of various security topics are solicited for submission to IWSEC 2012. Topics of interest for IWSEC 2012 include but are not limited to:

  • Foundations of Security
    • Authentication
    • Biometrics
    • Block/Stream Ciphers
    • Cryptographic Protocols
    • Cryptanalysis
    • Digital Signatures
    • Hash Functions
    • Information Hiding
    • Public Key Cryptosystems
    • Quantum Security
    • Cryptographic Implementations and their Analysis
  • Security in Networks and Ubiquitous Computing Systems
    • Network Security
      • Intrusion Detection
      • Malware Detection
      • Security in Sensor Networks
    • Security of Ubiquitous and Cloud Computing
      • Security of Multi-party Computing
      • Authorization and Access Control
      • Mobile Security
    • Privacy Enhancing Technology
      • Anonymity-related Technology
      • Privacy Preserving System
      • Privacy on Web and DB
    • Software Security
      • Security Architectures
      • Data and System Integrity
      • Reliable Secure Interactions of Services
    • System Security
      • Operating System Security
      • Trusted Computing
  • Security in Real Life Applications
    • Secure Living and Working Environments
      • Secure Consumer Electronics
      • RFID Security
    • Security in Commerce and Government
      • DRM
      • Copyright Protection
      • Content Security E-business/e-commerce/e-government Security
    • Security Management
      • Access Control Policies and ISMS
      • Business Processes Security
    • Protection of Critical Infrastructures
      • Critical Infrastructure Protection
      • Risk Analysis and Risk Management
    • Testing, Verification and Certification
      • Security Verification
      • Assurance
    • Law, Policy, Ethics and Related Technologies
      • Digital Forensics
      • Information Law and Ethics