Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Samarati, Pierangela (Επιμελητής έκδοσης), Tunstall, Michael (Επιμελητής έκδοσης), Posegga, Joachim (Επιμελητής έκδοσης), Markantonakis, Konstantinos (Επιμελητής έκδοσης), Sauveron, Damien (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Σειρά:Lecture Notes in Computer Science, 6033
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Embedded Security
  • Efficient and Effective Buffer Overflow Protection on ARM Processors
  • Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines
  • A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
  • A Smart Card Implementation of the McEliece PKC
  • Evaluation Metrics of Physical Non-invasive Security
  • Protocols
  • Trust in Peer-to-Peer Content Distribution Protocols
  • Generic Constructions of Biometric Identity Based Encryption Systems
  • Design and Analysis of a Generalized Canvas Protocol
  • Highly Constrained Embedded Systems
  • Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
  • Practical Schemes for Privacy and Security Enhanced RFID
  • MoteAODV – An AODV Implementation for TinyOS 2.0
  • Security
  • Random Number Generation Based on Fingerprints
  • Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML
  • Fraud Detection for Voice over IP Services on Next-Generation Networks
  • Smart Card Security
  • Proxy Smart Card Systems
  • Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract?
  • Website Credential Storage and Two-Factor Web Authentication with a Java SIM
  • Algorithms
  • Attribute-Based Encryption with Break-Glass
  • On the Security of a Two-Factor Authentication Scheme
  • The Design of Secure and Efficient P2PSIP Communication Systems
  • Hardware Implementations
  • Novel FPGA-Based Signature Matching for Deep Packet Inspection
  • Towards Electrical, Integrated Implementations of SIMPL Systems
  • A Very Compact Hardware Implementation of the KASUMI Block Cipher
  • Embedded Systems
  • Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
  • Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions
  • Security Analysis of Mobile Phones Used as OTP Generators
  • An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks
  • Anonymity/Database Security
  • The Market Failure of Anonymity Services
  • Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios
  • Predicting and Preventing Insider Threat in Relational Database Systems.