Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 / Edition 1

Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 / Edition 1

by Jose A. Onieva
     
 

ISBN-10: 3540799656

ISBN-13: 9783540799658

Pub. Date: 05/28/2008

Publisher: Springer Berlin Heidelberg

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008.

The 10 revised full papers presented were carefully reviewed and selected from numerous submissions for

Overview

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008.

The 10 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book; they examine the rapid development of information technologies and the transition to next generation networks. The papers focus on the security of these complex and resource-constrained systems and are organized in topical sections on smart devices, network security, convergence, and cryptography.

Product Details

ISBN-13:
9783540799658
Publisher:
Springer Berlin Heidelberg
Publication date:
05/28/2008
Series:
Lecture Notes in Computer Science / Security and Cryptology Series, #5019
Edition description:
2008
Pages:
151
Product dimensions:
5.90(w) x 9.20(h) x 0.50(d)

Table of Contents

Smart Devices.- Untraceability of RFID Prools.- A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices.- Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information.- Network Security.- Probabilistic Identification for Hard to Classify Prool.- A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup.- Availability for DHT-Based Overlay Networks with Unidirectional Routing.- Convergence.- Network Smart Card Performing U(SIM) Functionalities in AAA Prool Architectures.- Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs).- Cryptography.- Algebra for Capability Based Attack Correlation.- On the BRIP Algorithms Security for RSA.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >