Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 / Edition 1

Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 / Edition 1

ISBN-10:
3540799656
ISBN-13:
9783540799658
Pub. Date:
06/06/2008
Publisher:
Springer Berlin Heidelberg
ISBN-10:
3540799656
ISBN-13:
9783540799658
Pub. Date:
06/06/2008
Publisher:
Springer Berlin Heidelberg
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 / Edition 1

Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 / Edition 1

Paperback

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.


Overview

With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded systems are becoming more and more mobile and ubiquitous. They also strongly interact with the physical world. Ensuring the security of these complex and resource-constrained systems is a really challenging research topic. Therefore this Workshop in Information Security Theory and Practices was organized to bring together researchers and practitioners in related areas, and to encourage cooperation between the research and the industrial communities. This was the second edition of WISTP, after the first event in Heraklion, Greece, in 2007. This year again we had a significant number of high-quality submissions coming from many different countries. These submissions reffected the major topics of the conference, i. e. , smart devices, convergence, and ne- generation networks. Submissions were reviewed by at least three reviewers, in most cases by four, and at least by five for the papers involving Program Comittee members. This long and rigorousprocess could be achievedthanks to the hard work of the Program Committee members and additional reviewers, listed in the following pages. This led to the selection of high-quality papers that made up the workshop program and are published in these proceedings. A number of posters and short papers were also selected for presentation at the conference. The process was very selective and we would like to thank all those authors who submitted contributions that could not be selected.

Product Details

ISBN-13: 9783540799658
Publisher: Springer Berlin Heidelberg
Publication date: 06/06/2008
Series: Lecture Notes in Computer Science , #5019
Edition description: 2008
Pages: 151
Product dimensions: 5.90(w) x 9.20(h) x 0.50(d)

Table of Contents

Smart Devices.- Untraceability of RFID Prools.- A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices.- Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information.- Network Security.- Probabilistic Identification for Hard to Classify Prool.- A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup.- Availability for DHT-Based Overlay Networks with Unidirectional Routing.- Convergence.- Network Smart Card Performing U(SIM) Functionalities in AAA Prool Architectures.- Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs).- Cryptography.- Algebra for Capability Based Attack Correlation.- On the BRIP Algorithms Security for RSA.
From the B&N Reads Blog

Customer Reviews