Information Security Theory and Practice. Securing the Internet of Things

8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 – July 2, 2014. Proceedings

  • David Naccache
  • Damien Sauveron

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8501)

Table of contents

  1. Front Matter
  2. Invited Paper

    1. Timo Kasper, David Oswald, Christof Paar
      Pages 1-9
  3. Cryptography and Cryptanalysis

    1. Ju-Sung Kang, Nayoung Kim, Wangho Ju, Ok-Yeon Yi
      Pages 10-23
    2. Raphael Spreitzer, Benoît Gérard
      Pages 24-39
    3. Julien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi
      Pages 40-56
  4. Smart Cards and Embedded Devices

    1. Yuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley et al.
      Pages 76-91
  5. Privacy

    1. Delphine Christin, Franziska Engelmann, Matthias Hollick
      Pages 92-107
    2. Dan Bogdanov, Keita Emura, Roman Jagomägis, Akira Kanaoka, Shin’ichiro Matsuo, Jan Willemson
      Pages 108-123
    3. Raja Naeem Akram, Ryan K. L. Ko
      Pages 124-139
  6. Short Papers

    1. Stjepan Picek, Lejla Batina, Domagoj Jakobović, Barış Ege, Marin Golub
      Pages 140-149
    2. Charalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, Konstantinos Kagiambakis, Ioannis Papaefstathiou
      Pages 150-159
    3. André Zúquete, Hélder Gomes, Cláudio Teixeira
      Pages 160-169
    4. Hafizah Mansor, Konstantinos Markantonakis, Keith Mayes
      Pages 170-179
    5. Tanya Ignatenko, Milan Petković
      Pages 180-189
    6. Konstantinos Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj
      Pages 190-199
  7. Back Matter

About these proceedings

Introduction

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy.

Keywords

ambient intelligence authentication cryptanalysis and other attacks cryptography cyber-physical systems embedded devices information security internet of things mobile devices mobile security network security privacy security services smart cards systems security

Editors and affiliations

  • David Naccache
    • 1
  • Damien Sauveron
    • 2
  1. 1.Département d’InformatiqueÉcole Normale SupérieureParisFrance
  2. 2.University of Limoges, XLIM, UMR CNRS 7252Limoges CedexFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-43826-8
  • Copyright Information IFIP International Federation for Information Processing 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-43825-1
  • Online ISBN 978-3-662-43826-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book