Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings /
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although th...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Σειρά: | Lecture Notes in Computer Science,
4462 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Mobility
- A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
- A New Resilient Key Management Protocol for Wireless Sensor Networks
- Hardware and Cryptography I
- Efficient Use of Random Delays in Embedded Software
- Enhanced Doubling Attacks on Signed-All-Bits Set Recoding
- Privacy
- Securing the Distribution and Storage of Secrets with Trusted Platform Modules
- Distributed Certified Information Access for Mobile Devices
- Cryptography Scheme
- Linkability of Some Blind Signature Schemes
- Optimistic Non-repudiation Protocol Analysis
- Secure Remote User Authentication Scheme Using Bilinear Pairings
- Cryptanalysis of Some Proxy Signature Schemes Without Certificates
- Smart Card
- Performance Evaluation of Java Card Bytecodes
- Reverse Engineering Java Card Applets Using Power Analysis
- An Embedded System for Practical Security Analysis of Contactless Smartcards
- A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies
- Small Devices
- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
- An Information Flow Verifier for Small Embedded Systems
- Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks
- Hardware and Cryptography II
- Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures
- CRT RSA Algorithm Protected Against Fault Attacks
- Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.