Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings / Edition 1

Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings / Edition 1

5.0 1
by Olivier Markowitch
     
 

ISBN-10: 364203943X

ISBN-13: 9783642039430

Pub. Date: 09/01/2009

Publisher: Springer Berlin Heidelberg

This volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP 2009 held in Brussels, Belgium in September 2009.

The 12 revised full papers presented were carefully reviewed and selected from 27 submissions for

Overview

This volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP 2009 held in Brussels, Belgium in September 2009.

The 12 revised full papers presented were carefully reviewed and selected from 27 submissions for inclusion in the book; they are organized in topical sections on mobility, attacks and secure implementations, performance and security, and cryptography.

Product Details

ISBN-13:
9783642039430
Publisher:
Springer Berlin Heidelberg
Publication date:
09/01/2009
Series:
Lecture Notes in Computer Science / Security and Cryptology Series, #5746
Edition description:
2009
Pages:
167
Product dimensions:
6.10(w) x 9.30(h) x 0.40(d)

Table of Contents

Mobility.- On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks.- A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems.- Privacy-Aware Location Database Service for Granular Queries.- Attacks and Secure Implementations.- Algebraic Attacks on RFID Protocols.- Anti-counterfeiting Using Memory Spots.- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations.- Performance and Security.- Measurement Analysis When Benchmarking Java Card Platforms.- Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card.- Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks.- Cryptography.- Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks.- Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure.- PKIX Certificate Status in Hybrid MANETs.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 5 out of 5 based on 0 ratings. 1 reviews.
pinpointAR More than 1 year ago
I’m loving McDonalds for fast food... MyDeals247 for the best deals;))