Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings /
This volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP 2009 held in Brussels, Belgium in September 2009. The 12 revised full papers presented were...
Corporate Author: | |
---|---|
Other Authors: | , , , , |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2009.
|
Series: | Lecture Notes in Computer Science,
5746 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Mobility
- On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
- A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
- Privacy-Aware Location Database Service for Granular Queries
- Attacks and Secure Implementations
- Algebraic Attacks on RFID Protocols
- Anti-counterfeiting Using Memory Spots
- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
- Performance and Security
- Measurement Analysis When Benchmarking Java Card Platforms
- Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card
- Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
- Cryptography
- Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks
- Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure
- PKIX Certificate Status in Hybrid MANETs.