Description |
1 online resource (xiii, 386 pages) : illustrations |
Series |
Lecture notes in computer science ; 6033 |
|
LNCS sublibrary: SL 4-security and cryptology |
|
Lecture notes in computer science ; 6033.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Embedded security. Efficient and effective buffer overflow protection on ARM processors / Raoul Strackx, Yves Younan, Pieter Philippaerts, and Frank Piessens -- Efficient entropy estimation for mutual information analysis using B-splines / Alexandre Venelli -- A probabilistic diffusion scheme for anomaly detection on smartphones / Tansu Alpcan, Christian Bauckhage, and Aubrey-Derrick Schmidt -- A smart card implementation of the McEliece PKC / Falko Strenzke -- Evaluation metrics of physical non-invasive security / Huiyun Li, Keke Wu, Fengqi Yu, and Hai Yuan -- Protocols. Trust in peer-to-peer content distribution protocols / Nicolai Kuntze, Carsten Rudolph, and Andreas Fuchs -- Generic constructions of biometric identity based encryption systems / Neyire Deniz Sarier -- Design and analysis of a generalized canvas protocol / Marián Novotný -- Highly constrained embedded systems. Efficient mutual authentication for multi-domain RFID systems using distributed signatures / Michael Braun, Ulrike Meyer, and Susanne Wetzel -- Practical schemes for privacy and security enhanced RFID (extended abstract) / Jaap-Henk Hoepman and Rieks Joosten -- MoteAODV : an AODV implementation for TinyOS 2.0 / Werner Backes and Jared Cordasco -- Security. Random number generation based on fingerprints / Shkodran Gerguri, Václav Matyáš, Zdeněk Říha, and Luděk Smolík -- Improvements of pan-European IDM architecture to enable identity delegation based on X.509 proxy certificates and SAML / Sergio Sánchez García and Ana Gómez Oliva -- Fraud detection for voice over IP services on next-generation networks / Igor Ruiz-Agundez, Yoseba K. Penya, and Pablo Garcia Bringas -- Smart card security. Proxy smart card systems / Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, and Ivan Visconti -- Can we support applications' evolution in multi-application smart cards by security-by-contract? / Nicola Dragoni, Olga Gadyatskaya, and Fabio Massacci -- Website credential storage and two-factor web authentication with a Java SIM / Jonathan Hart, Konstantinos Markantonakis, and Keith Mayes -- Algorithms. Attribute-based encryption with break-glass / Achim D. Brucker, Helmut Petritsch, and Stefan G. Weber -- On the security of a two-factor authentication scheme / Luigi Catuogno and Clemente Galdi -- The design of secure and efficient P2PSIP communication systems / Xianghan Zheng and Vladimir Oleshchuk -- Hardware implementations. Novel FPGA-based signature matching for deep packet inspection / Nitesh B. Guinde and Sotirios G. Ziavras -- Towards electrical, integrated implementations of SIMPL systems / Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, and György Csaba -- A very compact hardware implementation of the KASUMI block cipher / Dai Yamamoto, Kouichi Itoh, and Jun Yajima -- Embedded systems. Secure and usable out-of-band channels for ad hoc mobile device interactions / Ronald Kainda, Ivan Flechais, and A.W. Roscoe -- Identification and verification of security relevant functions in embedded systems based on source code annotations and assertions / Johannes Loinig, Christian Steger, Reinhold Weiss, and Ernst Haselsteiner -- Security analysis of mobile phones used as OTP generators / Håvard Raddum, Lars Hopland Nestås, and Kjell Jørgen Hole -- An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks / Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, and Amparo Fúster-Sabater -- Anonymity/database security. The market failure of anonymity services / Heiko Rossnagel -- Exploiting node mobility for coordinating data usage in crisis scenarios / Giovanni Russello and Enrico Scalavino -- Predicting and preventing insider threat in relational database systems / Qussai Yaseen and Brajendra Panda |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
In |
Springer eBooks |
Subject |
Data protection -- Congresses
|
|
Computer systems -- Access control -- Congresses
|
|
Mobile computing -- Security measures -- Congresses
|
|
Smart cards -- Congresses
|
|
Ubiquitous computing -- Security measures -- Congresses
|
|
Computer security.
|
|
Computer Security
|
|
Computing Methodologies
|
|
Mobile Applications
|
|
Informatique.
|
|
Computer security
|
|
Computer systems -- Access control
|
|
Data protection
|
|
Smart cards
|
|
Chipkarte
|
|
Computersicherheit
|
|
Datensicherung
|
|
Eingebettetes System
|
|
Kryptoanalyse
|
|
Smart Device
|
|
Ubiquitous Computing
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Samarati, Pierangela.
|
LC no. |
2010923798 |
ISBN |
9783642123689 |
|
3642123686 |
|
9783642123672 |
|
3642123678 |
|