Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices

4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

  • Pierangela Samarati
  • Michael Tunstall
  • Joachim Posegga
  • Konstantinos Markantonakis
  • Damien Sauveron
Conference proceedings WISTP 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6033)

Table of contents

  1. Front Matter
  2. Embedded Security

    1. Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens
      Pages 1-16
    2. Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick Schmidt
      Pages 31-46
    3. Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan
      Pages 60-75
  3. Protocols

  4. Highly Constrained Embedded Systems

    1. Michael Braun, Ulrike Meyer, Susanne Wetzel
      Pages 122-137
    2. Jaap-Henk Hoepman, Rieks Joosten
      Pages 138-153
    3. Werner Backes, Jared Cordasco
      Pages 154-169
  5. Security

    1. Shkodran Gerguri, Václav Matyáš, Zdeněk Říha, Luděk Smolík
      Pages 170-182
    2. Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia Bringas
      Pages 199-212
  6. Smart Card Security

    1. Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti
      Pages 213-220
    2. Jonathan Hart, Konstantinos Markantonakis, Keith Mayes
      Pages 229-236
  7. Algorithms

    1. Achim D. Brucker, Helmut Petritsch, Stefan G. Weber
      Pages 237-244
    2. Luigi Catuogno, Clemente Galdi
      Pages 245-252

About these proceedings

Keywords

FPGA RFID SIP arm processors authentication collision attacks cryptanalysis cryptography information security intrusion detection java card key distribution mobile and ad hoc network smart cards wireless sensor networks

Editors and affiliations

  • Pierangela Samarati
    • 1
  • Michael Tunstall
    • 2
  • Joachim Posegga
    • 3
  • Konstantinos Markantonakis
    • 4
  • Damien Sauveron
    • 5
  1. 1.Dipartimento di Tecnologie dell’ InformazioneUniversità degli Studi di MilanoCremaItaly
  2. 2.Department of Computer Science, Merchant Venturers BuildingUniversity of BristolBristolUK
  3. 3.Institute of IT Security and Security LawPassauGermany
  4. 4.Information Security Group, Smart Card CentreUniversity of LondonSurreyUK
  5. 5.XLIM, UMR CNRS 6172University of LimogesLimogesFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-12368-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-12367-2
  • Online ISBN 978-3-642-12368-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book