Amazon cover image
Image from Amazon.com

Information security theory and practices : security and privacy of pervasive systems and smart devices : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010 : proceedings / Pierangela Samarati [and others] (eds.).

By: Contributor(s): Material type: TextTextPublisher number: 80012255Series: Lecture notes in computer science ; 6033. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2010.Description: 1 online resource (xiii, 386 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642123689
  • 3642123686
  • 9783642123672
  • 3642123678
Subject(s): Genre/Form: Additional physical formats: Print version:: Information security theory and practices.DDC classification:
  • 005.8/2 22
LOC classification:
  • QA76.9.A25 W578 2010
NLM classification:
  • QA 76.9.A25
Other classification:
  • SS 4800
  • DAT 260f
  • DAT 460f
  • DAT 465f
  • DAT 179f
Online resources:
Contents:
Embedded security. Efficient and effective buffer overflow protection on ARM processors / Raoul Strackx, Yves Younan, Pieter Philippaerts, and Frank Piessens -- Efficient entropy estimation for mutual information analysis using B-splines / Alexandre Venelli -- A probabilistic diffusion scheme for anomaly detection on smartphones / Tansu Alpcan, Christian Bauckhage, and Aubrey-Derrick Schmidt -- A smart card implementation of the McEliece PKC / Falko Strenzke -- Evaluation metrics of physical non-invasive security / Huiyun Li, Keke Wu, Fengqi Yu, and Hai Yuan -- Protocols. Trust in peer-to-peer content distribution protocols / Nicolai Kuntze, Carsten Rudolph, and Andreas Fuchs -- Generic constructions of biometric identity based encryption systems / Neyire Deniz Sarier -- Design and analysis of a generalized canvas protocol / Marián Novotný -- Highly constrained embedded systems. Efficient mutual authentication for multi-domain RFID systems using distributed signatures / Michael Braun, Ulrike Meyer, and Susanne Wetzel -- Practical schemes for privacy and security enhanced RFID (extended abstract) / Jaap-Henk Hoepman and Rieks Joosten -- MoteAODV : an AODV implementation for TinyOS 2.0 / Werner Backes and Jared Cordasco -- Security. Random number generation based on fingerprints / Shkodran Gerguri, Václav Matyáš, Zdeněk Říha, and Luděk Smolík -- Improvements of pan-European IDM architecture to enable identity delegation based on X.509 proxy certificates and SAML / Sergio Sánchez García and Ana Gómez Oliva -- Fraud detection for voice over IP services on next-generation networks / Igor Ruiz-Agundez, Yoseba K. Penya, and Pablo Garcia Bringas -- Smart card security. Proxy smart card systems / Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, and Ivan Visconti -- Can we support applications' evolution in multi-application smart cards by security-by-contract? / Nicola Dragoni, Olga Gadyatskaya, and Fabio Massacci -- Website credential storage and two-factor web authentication with a Java SIM / Jonathan Hart, Konstantinos Markantonakis, and Keith Mayes -- Algorithms. Attribute-based encryption with break-glass / Achim D. Brucker, Helmut Petritsch, and Stefan G. Weber -- On the security of a two-factor authentication scheme / Luigi Catuogno and Clemente Galdi -- The design of secure and efficient P2PSIP communication systems / Xianghan Zheng and Vladimir Oleshchuk -- Hardware implementations. Novel FPGA-based signature matching for deep packet inspection / Nitesh B. Guinde and Sotirios G. Ziavras -- Towards electrical, integrated implementations of SIMPL systems / Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, and György Csaba -- A very compact hardware implementation of the KASUMI block cipher / Dai Yamamoto, Kouichi Itoh, and Jun Yajima -- Embedded systems. Secure and usable out-of-band channels for ad hoc mobile device interactions / Ronald Kainda, Ivan Flechais, and A.W. Roscoe -- Identification and verification of security relevant functions in embedded systems based on source code annotations and assertions / Johannes Loinig, Christian Steger, Reinhold Weiss, and Ernst Haselsteiner -- Security analysis of mobile phones used as OTP generators / Håvard Raddum, Lars Hopland Nestås, and Kjell Jørgen Hole -- An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks / Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, and Amparo Fúster-Sabater -- Anonymity/database security. The market failure of anonymity services / Heiko Rossnagel -- Exploiting node mobility for coordinating data usage in crisis scenarios / Giovanni Russello and Enrico Scalavino -- Predicting and preventing insider threat in relational database systems / Qussai Yaseen and Brajendra Panda.
In: Springer eBooks
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes bibliographical references and index.

Embedded security. Efficient and effective buffer overflow protection on ARM processors / Raoul Strackx, Yves Younan, Pieter Philippaerts, and Frank Piessens -- Efficient entropy estimation for mutual information analysis using B-splines / Alexandre Venelli -- A probabilistic diffusion scheme for anomaly detection on smartphones / Tansu Alpcan, Christian Bauckhage, and Aubrey-Derrick Schmidt -- A smart card implementation of the McEliece PKC / Falko Strenzke -- Evaluation metrics of physical non-invasive security / Huiyun Li, Keke Wu, Fengqi Yu, and Hai Yuan -- Protocols. Trust in peer-to-peer content distribution protocols / Nicolai Kuntze, Carsten Rudolph, and Andreas Fuchs -- Generic constructions of biometric identity based encryption systems / Neyire Deniz Sarier -- Design and analysis of a generalized canvas protocol / Marián Novotný -- Highly constrained embedded systems. Efficient mutual authentication for multi-domain RFID systems using distributed signatures / Michael Braun, Ulrike Meyer, and Susanne Wetzel -- Practical schemes for privacy and security enhanced RFID (extended abstract) / Jaap-Henk Hoepman and Rieks Joosten -- MoteAODV : an AODV implementation for TinyOS 2.0 / Werner Backes and Jared Cordasco -- Security. Random number generation based on fingerprints / Shkodran Gerguri, Václav Matyáš, Zdeněk Říha, and Luděk Smolík -- Improvements of pan-European IDM architecture to enable identity delegation based on X.509 proxy certificates and SAML / Sergio Sánchez García and Ana Gómez Oliva -- Fraud detection for voice over IP services on next-generation networks / Igor Ruiz-Agundez, Yoseba K. Penya, and Pablo Garcia Bringas -- Smart card security. Proxy smart card systems / Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, and Ivan Visconti -- Can we support applications' evolution in multi-application smart cards by security-by-contract? / Nicola Dragoni, Olga Gadyatskaya, and Fabio Massacci -- Website credential storage and two-factor web authentication with a Java SIM / Jonathan Hart, Konstantinos Markantonakis, and Keith Mayes -- Algorithms. Attribute-based encryption with break-glass / Achim D. Brucker, Helmut Petritsch, and Stefan G. Weber -- On the security of a two-factor authentication scheme / Luigi Catuogno and Clemente Galdi -- The design of secure and efficient P2PSIP communication systems / Xianghan Zheng and Vladimir Oleshchuk -- Hardware implementations. Novel FPGA-based signature matching for deep packet inspection / Nitesh B. Guinde and Sotirios G. Ziavras -- Towards electrical, integrated implementations of SIMPL systems / Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, and György Csaba -- A very compact hardware implementation of the KASUMI block cipher / Dai Yamamoto, Kouichi Itoh, and Jun Yajima -- Embedded systems. Secure and usable out-of-band channels for ad hoc mobile device interactions / Ronald Kainda, Ivan Flechais, and A.W. Roscoe -- Identification and verification of security relevant functions in embedded systems based on source code annotations and assertions / Johannes Loinig, Christian Steger, Reinhold Weiss, and Ernst Haselsteiner -- Security analysis of mobile phones used as OTP generators / Håvard Raddum, Lars Hopland Nestås, and Kjell Jørgen Hole -- An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks / Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, and Amparo Fúster-Sabater -- Anonymity/database security. The market failure of anonymity services / Heiko Rossnagel -- Exploiting node mobility for coordinating data usage in crisis scenarios / Giovanni Russello and Enrico Scalavino -- Predicting and preventing insider threat in relational database systems / Qussai Yaseen and Brajendra Panda.

Print version record.

Powered by Koha