Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings /

With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although th...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Sauveron, Damien (Επιμελητής έκδοσης), Markantonakis, Konstantinos (Επιμελητής έκδοσης), Bilas, Angelos (Επιμελητής έκδοσης), Quisquater, Jean-Jacques (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Σειρά:Lecture Notes in Computer Science, 4462
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Mobility
  • A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
  • A New Resilient Key Management Protocol for Wireless Sensor Networks
  • Hardware and Cryptography I
  • Efficient Use of Random Delays in Embedded Software
  • Enhanced Doubling Attacks on Signed-All-Bits Set Recoding
  • Privacy
  • Securing the Distribution and Storage of Secrets with Trusted Platform Modules
  • Distributed Certified Information Access for Mobile Devices
  • Cryptography Scheme
  • Linkability of Some Blind Signature Schemes
  • Optimistic Non-repudiation Protocol Analysis
  • Secure Remote User Authentication Scheme Using Bilinear Pairings
  • Cryptanalysis of Some Proxy Signature Schemes Without Certificates
  • Smart Card
  • Performance Evaluation of Java Card Bytecodes
  • Reverse Engineering Java Card Applets Using Power Analysis
  • An Embedded System for Practical Security Analysis of Contactless Smartcards
  • A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies
  • Small Devices
  • Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
  • An Information Flow Verifier for Small Embedded Systems
  • Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks
  • Hardware and Cryptography II
  • Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures
  • CRT RSA Algorithm Protected Against Fault Attacks
  • Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.