


default search action
3. WISTP 2009: Brussels, Belgium
- Olivier Markowitch, Angelos Bilas
, Jaap-Henk Hoepman, Chris J. Mitchell
, Jean-Jacques Quisquater:
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings. Lecture Notes in Computer Science 5746, Springer 2009, ISBN 978-3-642-03943-0
Mobility
- Olivier Heen, Gilles Guette, Thomas Genet:
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks. 1-11 - Marc Jaimez, Oscar Esparza, Jose L. Muñoz
, Juan J. Alins-Delgado, Jorge Mata-Díaz:
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems. 12-27 - Shinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima
:
Privacy-Aware Location Database Service for Granular Queries. 28-37
Attacks and Secure Implementations
- Ton van Deursen, Sasa Radomirovic
:
Algebraic Attacks on RFID Protocols. 38-51 - Helen Balinsky, Edward McDonnell, Liqun Chen
, Keith A. Harrison:
Anti-counterfeiting Using Memory Spots. 52-67 - Emmanuelle Dottax, Christophe Giraud
, Matthieu Rivain, Yannick Sierra:
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. 68-83
Performance and Security
- Pierre Paradinas, Julien Cordry, Samia Bouzefrane:
Measurement Analysis When Benchmarking Java Card Platforms. 84-94 - Hendrik Tews, Bart Jacobs:
Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card. 95-111 - Christian Lederer, Roland Mader, Manuel Koschuch
, Johann Großschädl, Alexander Szekely, Stefan Tillich:
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. 112-127
Cryptography
- J. A. M. Naranjo
, Juan Antonio López-Ramos, Leocadio G. Casado
:
Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks. 128-142 - Keith M. Martin, Maura B. Paterson
:
Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure. 143-152 - Jose L. Muñoz
, Oscar Esparza, Carlos Gañán, Javier Parra-Arnau:
PKIX Certificate Status in Hybrid MANETs. 153-166

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.