Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
6033 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Embedded Security
- Efficient and Effective Buffer Overflow Protection on ARM Processors
- Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines
- A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
- A Smart Card Implementation of the McEliece PKC
- Evaluation Metrics of Physical Non-invasive Security
- Protocols
- Trust in Peer-to-Peer Content Distribution Protocols
- Generic Constructions of Biometric Identity Based Encryption Systems
- Design and Analysis of a Generalized Canvas Protocol
- Highly Constrained Embedded Systems
- Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
- Practical Schemes for Privacy and Security Enhanced RFID
- MoteAODV - An AODV Implementation for TinyOS 2.0
- Security
- Random Number Generation Based on Fingerprints
- Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML
- Fraud Detection for Voice over IP Services on Next-Generation Networks
- Smart Card Security
- Proxy Smart Card Systems
- Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?
- Website Credential Storage and Two-Factor Web Authentication with a Java SIM
- Algorithms
- Attribute-Based Encryption with Break-Glass
- On the Security of a Two-Factor Authentication Scheme
- The Design of Secure and Efficient P2PSIP Communication Systems
- Hardware Implementations
- Novel FPGA-Based Signature Matching for Deep Packet Inspection
- Towards Electrical, Integrated Implementations of SIMPL Systems
- A Very Compact Hardware Implementation of the KASUMI Block Cipher
- Embedded Systems
- Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
- Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions
- Security Analysis of Mobile Phones Used as OTP Generators
- An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks
- Anonymity/Database Security
- The Market Failure of Anonymity Services
- Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios
- Predicting and Preventing Insider Threat in Relational Database Systems.