Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings

Bibliographic Details
Other Authors: Samarati, Pierangela (Editor), Tunstall, Michael (Editor), Posegga, Joachim (Editor), Markantonakis, Konstantinos (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2010, 2010
Edition:1st ed. 2010
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Security Analysis of Mobile Phones Used as OTP Generators
  • An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks
  • Anonymity/Database Security
  • The Market Failure of Anonymity Services
  • Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios
  • Predicting and Preventing Insider Threat in Relational Database Systems
  • Embedded Security
  • Efficient and Effective Buffer Overflow Protection on ARM Processors
  • Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines
  • A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
  • A Smart Card Implementation of the McEliece PKC
  • Evaluation Metrics of Physical Non-invasive Security
  • Protocols
  • Trust in Peer-to-Peer Content Distribution Protocols
  • Generic Constructions of Biometric Identity Based Encryption Systems
  • Design and Analysis of a Generalized Canvas Protocol
  • Highly Constrained Embedded Systems
  • Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
  • Practical Schemes for Privacy and Security Enhanced RFID
  • MoteAODV – An AODV Implementation for TinyOS 2.0
  • Security
  • Random Number Generation Based on Fingerprints
  • Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML
  • Fraud Detection for Voice over IP Services on Next-Generation Networks
  • Smart Card Security
  • Proxy Smart Card Systems
  • Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract?
  • Website Credential Storage and Two-Factor Web Authentication with a Java SIM
  • Algorithms
  • Attribute-Based Encryption with Break-Glass
  • On the Security of a Two-Factor Authentication Scheme
  • The Design of Secure and Efficient P2PSIP Communication Systems
  • Hardware Implementations
  • Novel FPGA-Based Signature Matching for Deep Packet Inspection
  • Towards Electrical, Integrated Implementations of SIMPL Systems
  • A Very Compact Hardware Implementation of the KASUMI Block Cipher
  • Embedded Systems
  • Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
  • Identification andVerification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions