default search action
1. WISTP 2007: Heraklion, Crete, Greece
- Damien Sauveron, Constantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater:
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings. Lecture Notes in Computer Science 4462, Springer 2007, ISBN 978-3-540-72353-0
Mobility
- Eve Atallah, Serge Chaumette:
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks. 1-13 - Chakib Bekara, Maryline Laurent-Maknavicius:
A New Resilient Key Management Protocol for Wireless Sensor Networks. 14-26
Hardware and Cryptography I
- Michael Tunstall, Olivier Benoît:
Efficient Use of Random Delays in Embedded Software. 27-38 - HeeSeok Kim, Tae Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim:
Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. 39-52
Privacy
- Paul E. Sevinç, Mario Strasser, David A. Basin:
Securing the Distribution and Storage of Secrets with Trusted Platform Modules. 53-66 - Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano:
Distributed Certified Information Access for Mobile Devices. 67-79
Cryptography Scheme
- Swee-Huay Heng, Wun-She Yap, Khoongming Khoo:
Linkability of Some Blind Signature Schemes. 80-89 - Judson Santiago, Laurent Vigneron:
Optimistic Non-repudiation Protocol Analysis. 90-101 - Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo:
Secure Remote User Authentication Scheme Using Bilinear Pairings. 102-114 - Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
Cryptanalysis of Some Proxy Signature Schemes Without Certificates. 115-126
Smart Card
- Pierre Paradinas, Julien Cordry, Samia Bouzefrane:
Performance Evaluation of Java Card Bytecodes. 127-137 - Dennis Vermoen, Marc F. Witteman, Georgi Gaydadjiev:
Reverse Engineering Java Card Applets Using Power Analysis. 138-149 - Timo Kasper, Dario Carluccio, Christof Paar:
An Embedded System for Practical Security Analysis of Contactless Smartcards. 150-160 - Kevin Eagles, Constantinos Markantonakis, Keith Mayes:
A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies. 161-174
Small Devices
- Walter Bamberger, Oliver Welter, Stephan Spitz:
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication. 175-188 - Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl:
An Information Flow Verifier for Small Embedded Systems. 189-201 - Nicolas Fournel, Marine Minier, Stéphane Ubéda:
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. 202-214
Hardware and Cryptography II
- Chong Hee Kim, Jean-Jacques Quisquater:
Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. 215-228 - Arnaud Boscher, Robert Naciri, Emmanuel Prouff:
CRT RSA Algorithm Protected Against Fault Attacks. 229-243 - Frank Vater, Steffen Peter, Peter Langendörfer:
Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks. 244-253
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.