Information security theory and practices : security and privacy of pervasive systems and smart devices : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010 : proceedings / Pierangela Samarati [and others] (eds.).
Material type:
TextPublisher number: 80012255Series: Lecture notes in computer science ; 6033. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2010.Description: 1 online resource (xiii, 386 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783642123689
- 3642123686
- 9783642123672
- 3642123678
- Data protection -- Congresses
- Computer systems -- Access control -- Congresses
- Mobile computing -- Security measures -- Congresses
- Smart cards -- Congresses
- Ubiquitous computing -- Security measures -- Congresses
- Computer security
- Computer Security
- Computing Methodologies
- Mobile Applications
- Protection de l'information (Informatique) -- Congrès
- Systèmes informatiques -- Accès -- Contrôle -- Congrès
- Informatique mobile -- Sécurité -- Mesures -- Congrès
- Cartes à mémoire -- Congrès
- Informatique omniprésente -- Sécurité -- Mesures -- Congrès
- Sécurité informatique
- Informatique
- Computer security
- Computer systems -- Access control
- Data protection
- Smart cards
- Chipkarte
- Computersicherheit
- Datensicherung
- Eingebettetes System
- Kryptoanalyse
- Smart Device
- Ubiquitous Computing
- 005.8/2 22
- QA76.9.A25 W578 2010
- QA 76.9.A25
- SS 4800
- DAT 260f
- DAT 460f
- DAT 465f
- DAT 179f
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes bibliographical references and index.
Embedded security. Efficient and effective buffer overflow protection on ARM processors / Raoul Strackx, Yves Younan, Pieter Philippaerts, and Frank Piessens -- Efficient entropy estimation for mutual information analysis using B-splines / Alexandre Venelli -- A probabilistic diffusion scheme for anomaly detection on smartphones / Tansu Alpcan, Christian Bauckhage, and Aubrey-Derrick Schmidt -- A smart card implementation of the McEliece PKC / Falko Strenzke -- Evaluation metrics of physical non-invasive security / Huiyun Li, Keke Wu, Fengqi Yu, and Hai Yuan -- Protocols. Trust in peer-to-peer content distribution protocols / Nicolai Kuntze, Carsten Rudolph, and Andreas Fuchs -- Generic constructions of biometric identity based encryption systems / Neyire Deniz Sarier -- Design and analysis of a generalized canvas protocol / Marián Novotný -- Highly constrained embedded systems. Efficient mutual authentication for multi-domain RFID systems using distributed signatures / Michael Braun, Ulrike Meyer, and Susanne Wetzel -- Practical schemes for privacy and security enhanced RFID (extended abstract) / Jaap-Henk Hoepman and Rieks Joosten -- MoteAODV : an AODV implementation for TinyOS 2.0 / Werner Backes and Jared Cordasco -- Security. Random number generation based on fingerprints / Shkodran Gerguri, Václav Matyáš, Zdeněk Říha, and Luděk Smolík -- Improvements of pan-European IDM architecture to enable identity delegation based on X.509 proxy certificates and SAML / Sergio Sánchez García and Ana Gómez Oliva -- Fraud detection for voice over IP services on next-generation networks / Igor Ruiz-Agundez, Yoseba K. Penya, and Pablo Garcia Bringas -- Smart card security. Proxy smart card systems / Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, and Ivan Visconti -- Can we support applications' evolution in multi-application smart cards by security-by-contract? / Nicola Dragoni, Olga Gadyatskaya, and Fabio Massacci -- Website credential storage and two-factor web authentication with a Java SIM / Jonathan Hart, Konstantinos Markantonakis, and Keith Mayes -- Algorithms. Attribute-based encryption with break-glass / Achim D. Brucker, Helmut Petritsch, and Stefan G. Weber -- On the security of a two-factor authentication scheme / Luigi Catuogno and Clemente Galdi -- The design of secure and efficient P2PSIP communication systems / Xianghan Zheng and Vladimir Oleshchuk -- Hardware implementations. Novel FPGA-based signature matching for deep packet inspection / Nitesh B. Guinde and Sotirios G. Ziavras -- Towards electrical, integrated implementations of SIMPL systems / Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, and György Csaba -- A very compact hardware implementation of the KASUMI block cipher / Dai Yamamoto, Kouichi Itoh, and Jun Yajima -- Embedded systems. Secure and usable out-of-band channels for ad hoc mobile device interactions / Ronald Kainda, Ivan Flechais, and A.W. Roscoe -- Identification and verification of security relevant functions in embedded systems based on source code annotations and assertions / Johannes Loinig, Christian Steger, Reinhold Weiss, and Ernst Haselsteiner -- Security analysis of mobile phones used as OTP generators / Håvard Raddum, Lars Hopland Nestås, and Kjell Jørgen Hole -- An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks / Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, and Amparo Fúster-Sabater -- Anonymity/database security. The market failure of anonymity services / Heiko Rossnagel -- Exploiting node mobility for coordinating data usage in crisis scenarios / Giovanni Russello and Enrico Scalavino -- Predicting and preventing insider threat in relational database systems / Qussai Yaseen and Brajendra Panda.
Print version record.