Limit search to available items
Record 34 of 46
Previous Record Next Record
Book Cover
E-book
Author WISTP 2010 (2010 : Passau, Germany)

Title Information security theory and practices : security and privacy of pervasive systems and smart devices : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010 : proceedings / Pierangela Samarati [and others] (eds.)
Published Berlin ; New York : Springer, ©2010

Copies

Description 1 online resource (xiii, 386 pages) : illustrations
Series Lecture notes in computer science ; 6033
LNCS sublibrary: SL 4-security and cryptology
Lecture notes in computer science ; 6033.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Embedded security. Efficient and effective buffer overflow protection on ARM processors / Raoul Strackx, Yves Younan, Pieter Philippaerts, and Frank Piessens -- Efficient entropy estimation for mutual information analysis using B-splines / Alexandre Venelli -- A probabilistic diffusion scheme for anomaly detection on smartphones / Tansu Alpcan, Christian Bauckhage, and Aubrey-Derrick Schmidt -- A smart card implementation of the McEliece PKC / Falko Strenzke -- Evaluation metrics of physical non-invasive security / Huiyun Li, Keke Wu, Fengqi Yu, and Hai Yuan -- Protocols. Trust in peer-to-peer content distribution protocols / Nicolai Kuntze, Carsten Rudolph, and Andreas Fuchs -- Generic constructions of biometric identity based encryption systems / Neyire Deniz Sarier -- Design and analysis of a generalized canvas protocol / Marián Novotný -- Highly constrained embedded systems. Efficient mutual authentication for multi-domain RFID systems using distributed signatures / Michael Braun, Ulrike Meyer, and Susanne Wetzel -- Practical schemes for privacy and security enhanced RFID (extended abstract) / Jaap-Henk Hoepman and Rieks Joosten -- MoteAODV : an AODV implementation for TinyOS 2.0 / Werner Backes and Jared Cordasco -- Security. Random number generation based on fingerprints / Shkodran Gerguri, Václav Matyáš, Zdeněk Říha, and Luděk Smolík -- Improvements of pan-European IDM architecture to enable identity delegation based on X.509 proxy certificates and SAML / Sergio Sánchez García and Ana Gómez Oliva -- Fraud detection for voice over IP services on next-generation networks / Igor Ruiz-Agundez, Yoseba K. Penya, and Pablo Garcia Bringas -- Smart card security. Proxy smart card systems / Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, and Ivan Visconti -- Can we support applications' evolution in multi-application smart cards by security-by-contract? / Nicola Dragoni, Olga Gadyatskaya, and Fabio Massacci -- Website credential storage and two-factor web authentication with a Java SIM / Jonathan Hart, Konstantinos Markantonakis, and Keith Mayes -- Algorithms. Attribute-based encryption with break-glass / Achim D. Brucker, Helmut Petritsch, and Stefan G. Weber -- On the security of a two-factor authentication scheme / Luigi Catuogno and Clemente Galdi -- The design of secure and efficient P2PSIP communication systems / Xianghan Zheng and Vladimir Oleshchuk -- Hardware implementations. Novel FPGA-based signature matching for deep packet inspection / Nitesh B. Guinde and Sotirios G. Ziavras -- Towards electrical, integrated implementations of SIMPL systems / Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, and György Csaba -- A very compact hardware implementation of the KASUMI block cipher / Dai Yamamoto, Kouichi Itoh, and Jun Yajima -- Embedded systems. Secure and usable out-of-band channels for ad hoc mobile device interactions / Ronald Kainda, Ivan Flechais, and A.W. Roscoe -- Identification and verification of security relevant functions in embedded systems based on source code annotations and assertions / Johannes Loinig, Christian Steger, Reinhold Weiss, and Ernst Haselsteiner -- Security analysis of mobile phones used as OTP generators / Håvard Raddum, Lars Hopland Nestås, and Kjell Jørgen Hole -- An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks / Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, and Amparo Fúster-Sabater -- Anonymity/database security. The market failure of anonymity services / Heiko Rossnagel -- Exploiting node mobility for coordinating data usage in crisis scenarios / Giovanni Russello and Enrico Scalavino -- Predicting and preventing insider threat in relational database systems / Qussai Yaseen and Brajendra Panda
Bibliography Includes bibliographical references and index
Notes Print version record
In Springer eBooks
Subject Data protection -- Congresses
Computer systems -- Access control -- Congresses
Mobile computing -- Security measures -- Congresses
Smart cards -- Congresses
Ubiquitous computing -- Security measures -- Congresses
Computer security.
Computer Security
Computing Methodologies
Mobile Applications
Informatique.
Computer security
Computer systems -- Access control
Data protection
Smart cards
Chipkarte
Computersicherheit
Datensicherung
Eingebettetes System
Kryptoanalyse
Smart Device
Ubiquitous Computing
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Samarati, Pierangela.
LC no. 2010923798
ISBN 9783642123689
3642123686
9783642123672
3642123678