Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 / Edition 1

Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 / Edition 1

ISBN-10:
3540723536
ISBN-13:
9783540723530
Pub. Date:
06/11/2007
Publisher:
Springer Berlin Heidelberg
ISBN-10:
3540723536
ISBN-13:
9783540723530
Pub. Date:
06/11/2007
Publisher:
Springer Berlin Heidelberg
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 / Edition 1

Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 / Edition 1

Paperback

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.


Overview

With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constrained systems has emerged as one of the most pressing challenges for researchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In addition the workshop aims to bring together researchers and practitioners in related disciplines and encourage interchange and practical co-operation between academia and industry. Although this is the first ever WISTP event, the response from researchers was superb with over 68 papers submitted for potential inclusion in the workshop and proceedings. The submissions were reviewed by at least three reviewers, in most cases by four, and for program committee (PC) papers at least five reviewers. This long and rigorous process was only possible thanks to the hard work of the PC members and additional reviewers, listed in the following pages. We would like to express our gratitude to the PC members, who were very supportive from the very beginning of this project. Thanks are also due to the additional expert reviewers who helped the PC to select the final 20 workshop papers for publication in the proceedings. Of course we highly appreciate the efforts of all the authors who submitted papers to WISTP 2007. We hope they will contribute again to a future edition and encourage others to do so.

Product Details

ISBN-13: 9783540723530
Publisher: Springer Berlin Heidelberg
Publication date: 06/11/2007
Series: Lecture Notes in Computer Science , #4462
Edition description: 2007
Pages: 255
Product dimensions: 6.10(w) x 9.25(h) x 0.02(d)

Table of Contents

Mobility.- A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks.- A New Resilient Key Management Prool for Wireless Sensor Networks.- Hardware and Cryptography I.- Efficient Use of Random Delays in Embedded Software.- Enhanced Doubling Attacks on Signed-All-Bits Set Recoding.- Privacy.- Securing the Distribution and Storage of Secrets with Trusted Platform Modules.- Distributed Certified Information Access for Mobile Devices.- Cryptography Scheme.- Linkability of Some Blind Signature Schemes.- Optimistic Non-repudiation Prool Analysis.- Secure Remote User Authentication Scheme Using Bilinear Pairings.- Cryptanalysis of Some Proxy Signature Schemes Without Certificates.- Smart Card.- Performance Evaluation of Java Card Bytecodes.- Reverse Engineering Java Card Applets Using Power Analysis.- An Embedded System for Practical Security Analysis of Contactless Smartcards.- A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies.- Small Devices.- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication.- An Information Flow Verifier for Small Embedded Systems.- Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks.- Hardware and Cryptography II.- Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures.- CRT RSA Algorithm Protected Against Fault Attacks.- Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.
From the B&N Reads Blog

Customer Reviews