Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks

Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings

  • Olivier Markowitch
  • Angelos Bilas
  • Jaap-Henk Hoepman
  • Chris J. Mitchell
  • Jean-Jacques Quisquater
Conference proceedings WISTP 2009

DOI: 10.1007/978-3-642-03944-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5746)

Table of contents (12 papers)

  1. Front Matter
  2. Mobility

    1. On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks
      Olivier Heen, Gilles Guette, Thomas Genet
      Pages 1-11
    2. A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
      Marc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-Díaz
      Pages 12-27
    3. Privacy-Aware Location Database Service for Granular Queries
      Shinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima
      Pages 28-37
  3. Attacks and Secure Implementations

    1. Algebraic Attacks on RFID Protocols
      Ton van Deursen, Saša Radomirović
      Pages 38-51
    2. Anti-counterfeiting Using Memory Spots
      Helen Balinsky, Edward McDonnell, Liqun Chen, Keith Harrison
      Pages 52-67
    3. On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
      Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra
      Pages 68-83
  4. Performance and Security

    1. Measurement Analysis When Benchmarking Java Card Platforms
      Pierre Paradinas, Julien Cordry, Samia Bouzefrane
      Pages 84-94
    2. Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
      Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich
      Pages 112-127
  5. Cryptography

    1. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks
      J. A. M. Naranjo, J. A. López-Ramos, L. G. Casado
      Pages 128-142
    2. PKIX Certificate Status in Hybrid MANETs
      Jose L. Muñoz, Oscar Esparza, Carlos Gañán, Javier Parra-Arnau
      Pages 153-166
  6. Back Matter

About these proceedings

Introduction

This volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP 2009 held in Brussels, Belgium in September 2009.

The 12 revised full papers presented were carefully reviewed and selected from 27 submissions for inclusion in the book; they are organized in topical sections on mobility, attacks and secure implementations, performance and security, and cryptography.

Keywords

Java Card RFID RSA authentication collision attacks cryptography data security key distribution manet mobile ad hoc network mobile agent systems overlay networks p2p streamin wireless sensor networks

Editors and affiliations

  • Olivier Markowitch
    • 1
  • Angelos Bilas
    • 2
  • Jaap-Henk Hoepman
    • 3
  • Chris J. Mitchell
    • 4
  • Jean-Jacques Quisquater
    • 5
  1. 1.Université Libre de BruxellesBruxellesBelgium
  2. 2.Institute of Computer Science (ICS)Foundation for Research and Technology - Hellas (FORTH)Vassilika VoutonGreece
  3. 3.TNO, Eemsgolaan 3, P O Box 1416, 9701 BK Groningen, The Netherlands and Institute for Computing and Information Sciences, Radboud University Nijmegen, P.O. Box 9010, 6500, GL NijmegenThe Netherlands
  4. 4.Information Security GroupRoyal Holloway University of LondonEghamUK
  5. 5.Microelectronics LaboratoryUniversité Catholique de LouvainLouvain-la-NeuveBelgium

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-03943-0
  • Online ISBN 978-3-642-03944-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349