Advertisement

Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices

4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

  • Pierangela Samarati
  • Michael Tunstall
  • Joachim Posegga
  • Konstantinos Markantonakis
  • Damien Sauveron
Conference proceedings WISTP 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6033)

Table of contents

  1. Front Matter
  2. Embedded Security

    1. Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens
      Pages 1-16
    2. Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick Schmidt
      Pages 31-46
    3. Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan
      Pages 60-75
  3. Protocols

  4. Highly Constrained Embedded Systems

    1. Michael Braun, Ulrike Meyer, Susanne Wetzel
      Pages 122-137
    2. Jaap-Henk Hoepman, Rieks Joosten
      Pages 138-153
    3. Werner Backes, Jared Cordasco
      Pages 154-169
  5. Security

    1. Shkodran Gerguri, Václav Matyáš, Zdeněk Říha, Luděk Smolík
      Pages 170-182
    2. Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia Bringas
      Pages 199-212
  6. Smart Card Security

    1. Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti
      Pages 213-220
    2. Jonathan Hart, Konstantinos Markantonakis, Keith Mayes
      Pages 229-236
  7. Algorithms

    1. Achim D. Brucker, Helmut Petritsch, Stefan G. Weber
      Pages 237-244
    2. Luigi Catuogno, Clemente Galdi
      Pages 245-252
    3. Xianghan Zheng, Vladimir Oleshchuk
      Pages 253-260
  8. Hardware Implementations

    1. Nitesh B. Guinde, Sotirios G. Ziavras
      Pages 261-276
    2. Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, György Csaba
      Pages 277-292
    3. Dai Yamamoto, Kouichi Itoh, Jun Yajima
      Pages 293-307
  9. Embedded Systems

    1. Ronald Kainda, Ivan Flechais, A. W. Roscoe
      Pages 308-315
    2. Håvard Raddum, Lars Hopland Nestås, Kjell Jørgen Hole
      Pages 324-331
    3. Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater
      Pages 332-339
  10. Anonymity/Database Security

  11. Back Matter

About these proceedings

Keywords

FPGA RFID SIP arm processors authentication collision attacks cryptanalysis cryptography information security intrusion detection java card key distribution mobile and ad hoc network smart cards wireless sensor networks

Editors and affiliations

  • Pierangela Samarati
    • 1
  • Michael Tunstall
    • 2
  • Joachim Posegga
    • 3
  • Konstantinos Markantonakis
    • 4
  • Damien Sauveron
    • 5
  1. 1.Dipartimento di Tecnologie dell’ InformazioneUniversità degli Studi di MilanoCremaItaly
  2. 2.Department of Computer Science, Merchant Venturers BuildingUniversity of BristolBristolUK
  3. 3.Institute of IT Security and Security LawPassauGermany
  4. 4.Information Security Group, Smart Card CentreUniversity of LondonSurreyUK
  5. 5.XLIM, UMR CNRS 6172University of LimogesLimogesFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-12368-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-12367-2
  • Online ISBN 978-3-642-12368-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site