Cargando…

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Samarati, Pierangela (Editor ), Tunstall, Michael (Editor ), Posegga, Joachim (Editor ), Markantonakis, Konstantinos (Editor ), Sauveron, Damien (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6033
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Embedded Security
  • Efficient and Effective Buffer Overflow Protection on ARM Processors
  • Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines
  • A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
  • A Smart Card Implementation of the McEliece PKC
  • Evaluation Metrics of Physical Non-invasive Security
  • Protocols
  • Trust in Peer-to-Peer Content Distribution Protocols
  • Generic Constructions of Biometric Identity Based Encryption Systems
  • Design and Analysis of a Generalized Canvas Protocol
  • Highly Constrained Embedded Systems
  • Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
  • Practical Schemes for Privacy and Security Enhanced RFID
  • MoteAODV - An AODV Implementation for TinyOS 2.0
  • Security
  • Random Number Generation Based on Fingerprints
  • Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML
  • Fraud Detection for Voice over IP Services on Next-Generation Networks
  • Smart Card Security
  • Proxy Smart Card Systems
  • Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?
  • Website Credential Storage and Two-Factor Web Authentication with a Java SIM
  • Algorithms
  • Attribute-Based Encryption with Break-Glass
  • On the Security of a Two-Factor Authentication Scheme
  • The Design of Secure and Efficient P2PSIP Communication Systems
  • Hardware Implementations
  • Novel FPGA-Based Signature Matching for Deep Packet Inspection
  • Towards Electrical, Integrated Implementations of SIMPL Systems
  • A Very Compact Hardware Implementation of the KASUMI Block Cipher
  • Embedded Systems
  • Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
  • Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions
  • Security Analysis of Mobile Phones Used as OTP Generators
  • An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks
  • Anonymity/Database Security
  • The Market Failure of Anonymity Services
  • Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios
  • Predicting and Preventing Insider Threat in Relational Database Systems.