Cargando…

Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 /

With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Sauveron, Damien (Editor ), Markantonakis, Konstantinos (Editor ), Bilas, Angelos (Editor ), Quisquater, Jean-Jacques (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:Security and Cryptology ; 4462
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Mobility
  • A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
  • A New Resilient Key Management Protocol for Wireless Sensor Networks
  • Hardware and Cryptography I
  • Efficient Use of Random Delays in Embedded Software
  • Enhanced Doubling Attacks on Signed-All-Bits Set Recoding
  • Privacy
  • Securing the Distribution and Storage of Secrets with Trusted Platform Modules
  • Distributed Certified Information Access for Mobile Devices
  • Cryptography Scheme
  • Linkability of Some Blind Signature Schemes
  • Optimistic Non-repudiation Protocol Analysis
  • Secure Remote User Authentication Scheme Using Bilinear Pairings
  • Cryptanalysis of Some Proxy Signature Schemes Without Certificates
  • Smart Card
  • Performance Evaluation of Java Card Bytecodes
  • Reverse Engineering Java Card Applets Using Power Analysis
  • An Embedded System for Practical Security Analysis of Contactless Smartcards
  • A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies
  • Small Devices
  • Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
  • An Information Flow Verifier for Small Embedded Systems
  • Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks
  • Hardware and Cryptography II
  • Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures
  • CRT RSA Algorithm Protected Against Fault Attacks
  • Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.