Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings / Edition 1

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings / Edition 1

ISBN-10:
3642123678
ISBN-13:
9783642123672
Pub. Date:
05/21/2010
Publisher:
Springer Berlin Heidelberg
ISBN-10:
3642123678
ISBN-13:
9783642123672
Pub. Date:
05/21/2010
Publisher:
Springer Berlin Heidelberg
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings / Edition 1

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings / Edition 1

Paperback

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    Not Eligible for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

These proceedings contain the papers selected for presentation at the 4th Wo- shop on Information Security Theory and Practice (WISTP 2010), held during April 12-14, 2010 in Passau, Germany. In response to the call for papers, 69 papers were submitted to the wo- shop. These papers were evaluated on the basis of their signi?cance, novelty, and technicalquality. Eachpaper was reviewedby four members of the Program Committee. Reviewing was double-blind meaning that the Program Committee was not able to see the names and a?liations of the authors, and the authors were not told which committee members reviewed which papers. The Program Committee meeting was held electronically, holding intensive discussions over a periodoftwo weeks.Of the papers submitted, 20 full papersand 10shortpapers were selected for presentation at the workshop. This workshop was sponsored by Vodaphone, who also provided a best - per award. We would like to thank this organization for their support, which helped make this workshop possible. Their continued support helps to reduce registration fees and make WISTP a continuing success. WISTP 2010 was also organized in cooperation with the International - sociation for Cryptologic Research (IACR), the IFIP WG 11.2 Pervasive S- tems Security, and ACM SIGSAC. Their support has signi?cantly contributed to raising the pro?le of WISTP, which is re?ected in the number of high-quality submissions that we received.

Product Details

ISBN-13: 9783642123672
Publisher: Springer Berlin Heidelberg
Publication date: 05/21/2010
Series: Lecture Notes in Computer Science , #6033
Edition description: 2010
Pages: 386
Product dimensions: 6.20(w) x 9.30(h) x 0.80(d)

Table of Contents

Embedded Security

Efficient and Effective Buffer Overflow Protection on ARM Processors Raoul Strackx Yves Younan Pieter Philippaerts Frank Piessens 1

Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines Alexandre Venelli 17

A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones Tansu Alpcan Christian Bauckhage Aubrey-Derrick Schmidt 31

A Smart Card Implementation of the McEliece PKC Falko Strenzke 47

Evaluation Metrics of Physical Non-invasive Security Huiyun Li Keke Wu Fengqi Yu Hai Yuan 60

Protocols

Trust in Peer-to-Peer Content Distribution Protocols Nicolai Kuntze Carsten Rudolph Andreas Fuchs 76

Generic Constructions of Biometric Identity Based Encryption Systems Neyire Deniz Sarier 90

Design and Analysis of a Generalized Canvas Protocol Marián Novotný 106

Highly Constrained Embedded Systems

Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures Michael Braun Ulrike Meyer Susanne Wetzel 122

Practical Schemes for Privacy and Security Enhanced RFID (Extended Abstract) Jaap-Henk Hoepman Rieks Joosten 138

MoteAODV - An AODV Implementation for TinyOS 2.0 Werner Backes Jared Cordasco 154

Security

Random Number Generation Based on Fingerprints Shkodran Gerguri Václav Matyáš Zdenek Ríha Ludek Smolík 170

Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML Sergio Sánchez García Ana Gómez Oliva 183

Fraud Detection for Voice over IP Services on Next-Generation Networks Igor Ruiz-Agundez Yoseba K. Penya Pablo Garcia Bringas 199

Smart Card Security

Proxy Smart Card Systems Giuseppe Cattaneo Pompeo Faruolo Vincenzo Palazzo Ivan Visconti 213

Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? Nicola Dragoni Olga Gadyatskaya Fabio Massacci 221

Website Credential Storage and Two-Factor Web Authentication with a Java SIM Jonathan Hart Konstantinos Markantonakis Keith Mayes 229

Algorithms

Attribute-Based Encryption with Break-Glass Achim D. Brucker Helmut Petritsch Stefan G. Weber 237

On the Security of a Two-Factor Authentication Scheme Luigi Catuogno Clemente Galdi 245

The Design of Secure and Efficient P2PSIP Communication Systems Xianghan Zheng Vladimir Oleshchuk 253

Hardware Implementations

Novel FPGA-Based Signature Matching for Deep Packet Inspection Nitesh B. Guinde Sotirios G. Ziavras 261

Towards Electrical, Integrated Implementations of SIMPL Systems Ulrich Rührmair Qingqing Chen Martin Stutzmann Paolo Lugli Ulf Schlichtmann György Csaba 227

A Very Compact Hardware Implementation of the KASUMI Block Cipher Dai Yamamoto Kouichi Itoh Jun Yajima 293

Embedded Systems

Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions Ronald Kainda Ivan Flechais A.W. Roscoe 308

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions Johannes Loinig Christian Steger Reinhold Weiss Ernst Haselsteiner 316

Security Analysis of Mobile Phones Used as OTP Generators Håvard Raddum Lars Hopland Nestås Kjell Jørgen Hole 324

An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks Oscar Delgado-Mohatar José M. Sierra Ljiljana Brankovic Amparo Fúster-Sabater 332

Anonymity/Database Security

The Market Failure of Anonymity Services Heiko Rossnagel 340

Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios Giovanni Russello Enrico Scalavino 355

Predicting and Preventing Insider Threat in Relational Database Systems Qussai Yaseen Brajendra Panda 368

Author Index 385

From the B&N Reads Blog

Customer Reviews