


default search action
2. WISTP 2008: Seville, Spain
- Jose Antonio Onieva
, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Constantinos Markantonakis:
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings. Lecture Notes in Computer Science 5019, Springer 2008, ISBN 978-3-540-79965-8
Smart Devices
- Ton van Deursen, Sjouke Mauw
, Sasa Radomirovic
:
Untraceability of RFID Protocols. 1-15 - Luigi Catuogno
, Clemente Galdi
:
A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices. 16-35 - Matthew Judge, Paul D. Williams, Yong Kim, Barry E. Mullins:
Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information. 36-48
Network Security
- Elie Bursztein:
Probabilistic Identification for Hard to Classify Protocol. 49-63 - Christer Andersson, Markulf Kohlweiss
, Leonardo A. Martucci, Andriy Panchenko:
A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup. 64-77 - Jan Seedorf, Christian Muus:
Availability for DHT-Based Overlay Networks with Unidirectional Routing. 78-91
Convergence
- Joaquín Torres Márquez, Antonio Izquierdo, Mildrey Carbonell, José María Sierra:
Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures. 92-105 - Gilles Guette, Ciarán Bryce:
Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs). 106-116
Cryptography
- Navneet Kumar Pandey, S. K. Gupta, Shaveta Leekha:
Algebra for Capability Based Attack Correlation. 117-135 - Frédéric Amiel, Benoit Feix:
On the BRIP Algorithms Security for RSA. 136-149

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.