Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Σειρά: | Lecture Notes in Computer Science,
6033 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Embedded Security
- Efficient and Effective Buffer Overflow Protection on ARM Processors
- Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines
- A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
- A Smart Card Implementation of the McEliece PKC
- Evaluation Metrics of Physical Non-invasive Security
- Protocols
- Trust in Peer-to-Peer Content Distribution Protocols
- Generic Constructions of Biometric Identity Based Encryption Systems
- Design and Analysis of a Generalized Canvas Protocol
- Highly Constrained Embedded Systems
- Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
- Practical Schemes for Privacy and Security Enhanced RFID
- MoteAODV – An AODV Implementation for TinyOS 2.0
- Security
- Random Number Generation Based on Fingerprints
- Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML
- Fraud Detection for Voice over IP Services on Next-Generation Networks
- Smart Card Security
- Proxy Smart Card Systems
- Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract?
- Website Credential Storage and Two-Factor Web Authentication with a Java SIM
- Algorithms
- Attribute-Based Encryption with Break-Glass
- On the Security of a Two-Factor Authentication Scheme
- The Design of Secure and Efficient P2PSIP Communication Systems
- Hardware Implementations
- Novel FPGA-Based Signature Matching for Deep Packet Inspection
- Towards Electrical, Integrated Implementations of SIMPL Systems
- A Very Compact Hardware Implementation of the KASUMI Block Cipher
- Embedded Systems
- Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
- Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions
- Security Analysis of Mobile Phones Used as OTP Generators
- An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks
- Anonymity/Database Security
- The Market Failure of Anonymity Services
- Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios
- Predicting and Preventing Insider Threat in Relational Database Systems.