default search action
4. WISTP 2010: Passau, Germany
- Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron:
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings. Lecture Notes in Computer Science 6033, Springer 2010, ISBN 978-3-642-12367-2
Embedded Security
- Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens:
Efficient and Effective Buffer Overflow Protection on ARM Processors. 1-16 - Alexandre Venelli:
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines. 17-30 - Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick Schmidt:
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones. 31-46 - Falko Strenzke:
A Smart Card Implementation of the McEliece PKC. 47-59 - Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan:
Evaluation Metrics of Physical Non-invasive Security. 60-75
Protocols
- Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs:
Trust in Peer-to-Peer Content Distribution Protocols. 76-89 - Neyire Deniz Sarier:
Generic Constructions of Biometric Identity Based Encryption Systems. 90-105 - Marián Novotný:
Design and Analysis of a Generalized Canvas Protocol. 106-121
Highly Constrained Embedded Systems
- Michael Braun, Ulrike Meyer, Susanne Wetzel:
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures. 122-137 - Jaap-Henk Hoepman, Rieks Joosten:
Practical Schemes for Privacy and Security Enhanced RFID. 138-153 - Werner Backes, Jared Cordasco:
MoteAODV - An AODV Implementation for TinyOS 2.0. 154-169
Security
- Shkodran Gerguri, Václav Matyás Jr., Zdenek Ríha, Ludek Smolík:
Random Number Generation Based on Fingerprints. 170-182 - Sergio Sánchez García, Ana Gómez Oliva:
Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML. 183-198 - Igor Ruiz-Agundez, Yoseba K. Penya, Pablo García Bringas:
Fraud Detection for Voice over IP Services on Next-Generation Networks. 199-212
Smart Card Security
- Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti:
Proxy Smart Card Systems. 213-220 - Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci:
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? 221-228 - Jonathan Hart, Konstantinos Markantonakis, Keith Mayes:
Website Credential Storage and Two-Factor Web Authentication with a Java SIM. 229-236
Algorithms
- Achim D. Brucker, Helmut Petritsch, Stefan G. Weber:
Attribute-Based Encryption with Break-Glass. 237-244 - Luigi Catuogno, Clemente Galdi:
On the Security of a Two-Factor Authentication Scheme. 245-252 - Xianghan Zheng, Vladimir A. Oleshchuk:
The Design of Secure and Efficient P2PSIP Communication Systems. 253-260
Hardware Implementations
- Nitesh B. Guinde, Sotirios G. Ziavras:
Novel FPGA-Based Signature Matching for Deep Packet Inspection. 261-276 - Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, György Csaba:
Towards Electrical, Integrated Implementations of SIMPL Systems. 277-292 - Dai Yamamoto, Kouichi Itoh, Jun Yajima:
A Very Compact Hardware Implementation of the KASUMI Block Cipher. 293-307
Embedded Systems
- Ronald Kainda, Ivan Flechais, A. W. Roscoe:
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions. 308-315 - Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner:
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. 316-323 - Håvard Raddum, Lars Hopland Nestås, Kjell Jørgen Hole:
Security Analysis of Mobile Phones Used as OTP Generators. 324-331 - Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater:
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. 332-339
Anonymity/Database Security
- Heiko Rossnagel:
The Market Failure of Anonymity Services. 340-354 - Giovanni Russello, Enrico Scalavino:
Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios. 355-367 - Qussai Yaseen, Brajendra Panda:
Predicting and Preventing Insider Threat in Relational Database Systems. 368-383
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.