Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems

7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings

Editors:

ISBN: 978-3-642-38529-2 (Print) 978-3-642-38530-8 (Online)

Table of contents (9 chapters)

  1. Front Matter

    Pages -

  2. Cryptography and Cryptanalysis

    1. No Access

      Book Chapter

      Pages 1-17

      Multiplicative Homomorphic E-Auction with Formally Provable Security

    2. No Access

      Book Chapter

      Pages 18-33

      Malleable Signatures for Resource Constrained Platforms

    3. No Access

      Book Chapter

      Pages 34-49

      Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks

  3. Mobile Security

    1. No Access

      Book Chapter

      Pages 50-65

      URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security

    2. No Access

      Book Chapter

      Pages 66-81

      Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphone

  4. Smart Cards and Embedded Devices

    1. No Access

      Book Chapter

      Pages 82-97

      A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards

    2. No Access

      Book Chapter

      Pages 98-111

      A Forward Privacy Model for RFID Authentication Protocols

    3. No Access

      Book Chapter

      Pages 112-128

      On Secure Embedded Token Design

    4. No Access

      Book Chapter

      Pages 129-144

      Lightweight Authentication Protocol for Low-Cost RFID Tags

  5. Back Matter

    Pages -