IWSEC 2014 Accepted regular papers (in order of submission)
IWSEC 2014 Accepted short papers (in order of submission)
- Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy
Fu-Kuo Tseng, Rong-Jaye Chen and Bao-Shuh Paul Lin (National Chiao Tung University, Taiwan) - Exponentiation inversion problem reduced from fixed argument pairing inversion on twistable Ate pairing and its difficulty
Shoichi Akagi and Yasuyuki Nogami (Okayama University, Japan) - Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field
Satoshi Obana and Kazuya Tsuchida (Hosei University, Japan) - Secure Multi-party Computation for Elliptic Curves
Koutarou Suzuki and Kazuki Yoneyama (NTT, Japan) - More Constructions of Re-splittable Threshold Public Key Encryption
Satsuya Ohata (The University of Tokyo/AIST, Japan), Takahiro Matsuda (AIST, Japan), Goichiro Hanaoka (AIST, Japan) and Kanta Matsuura (The University of Tokyo, Japan) - Deterministic Hard Fault Attack on Trivium
Avijit Dutta (Jadavpur University, India) and Goutam Paul (Indian Statistical Institute) - Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data
Sanjit Chatterjee and Sayantan Mukherjee (Indian Institute of Science, India) - Key Management for Onion Routing in a True Peer to Peer Setting
Paolo Palmieri and Johan Pouwelse (Delft University of Technology, Netherlands)
Nilanjan Datta and Mridul Nandi (Indian Statistical Institute, India)
Yun-An Chang (National Taiwan University, Taiwan), Wei-Chih Hong (Academia Sinica, Taiwan), Ming-Chun Hsiao (National Taiwan University, Taiwan), Bo-Yin Yang (Academia Sinica, Taiwan), An-Yeu Wu (National Taiwan University, Taiwan) and Chen-Mou Cheng (National Taiwan University, Taiwan)
Rui Xu, Kirill Morozov and Tsuyoshi Takagi (Kyushu University, Japan)
Kosei Endo and Noboru Kunihiro (The University of Tokyo, Japan)
Dai Yamamoto (FUJITSU LABORATORIES LTD., Japan), Masahiko Takenaka (FUJITSU LABORATORIES LTD., Japan), Kazuo Sakiyama (The University of Electro-Communications, Japan) and Naoya Torii (FUJITSU LABORATORIES LTD., Japan)
Masaya Sato and Toshihiro Yamauchi (Okayama University, Japan)
Hailong Zhang (Chinese Academy of Sciences, China)
Asli Bay, Jialin Huang and Serge Vaudenay (EPFL, Switzerland)
Dingding Jia (Chinese Academy of Sciences, China), Bao Li (Chinese Academy of Sciences, China), Xianhui Lu (Chinese Academy of Sciences, China) and Qixiang Mei (Guangdong Ocean University, China)
Kuniyasu Suzaki (AIST, Japan), Toshiki Yagi (AIST, Japan), Kazukuni Kobara (AIST, Japan) and Toshiaki Ishiyama (FFRI, Japan)
Marina Krotofil (Hamburg University of Technology, Germany) and Jason Larsen (IOActive Inc., United States)
Muhammet Ali Evci (Informatic and Information Security Research Center, Turkey) and Selcuk Kavut (Gebze Institute of Technology, Turkey)
Jan Hajny (Brno University of Technology, Czech Republic), Lukas Malina (Brno University of Technology, Czech Republic) and Ondrej Tethal (OKsystem, Czech Republic)