Skip to main content
  • Conference proceedings
  • © 2010

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices

4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings

  • Fast-track conference proceedings

  • State-of-the-art research

  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6033)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISTP: IFIP International Conference on Information Security Theory and Practice

Conference proceedings info: WISTP 2010.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (30 papers)

  1. Front Matter

  2. Embedded Security

    1. Efficient and Effective Buffer Overflow Protection on ARM Processors

      • Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens
      Pages 1-16
    2. A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones

      • Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick Schmidt
      Pages 31-46
    3. Evaluation Metrics of Physical Non-invasive Security

      • Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan
      Pages 60-75
  3. Protocols

    1. Trust in Peer-to-Peer Content Distribution Protocols

      • Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs
      Pages 76-89
  4. Highly Constrained Embedded Systems

    1. Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures

      • Michael Braun, Ulrike Meyer, Susanne Wetzel
      Pages 122-137
    2. Practical Schemes for Privacy and Security Enhanced RFID

      • Jaap-Henk Hoepman, Rieks Joosten
      Pages 138-153
    3. MoteAODV – An AODV Implementation for TinyOS 2.0

      • Werner Backes, Jared Cordasco
      Pages 154-169
  5. Security

    1. Random Number Generation Based on Fingerprints

      • Shkodran Gerguri, Václav Matyáš, Zdeněk Říha, Luděk Smolík
      Pages 170-182
    2. Fraud Detection for Voice over IP Services on Next-Generation Networks

      • Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia Bringas
      Pages 199-212
  6. Smart Card Security

    1. Proxy Smart Card Systems

      • Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti
      Pages 213-220
    2. Website Credential Storage and Two-Factor Web Authentication with a Java SIM

      • Jonathan Hart, Konstantinos Markantonakis, Keith Mayes
      Pages 229-236
  7. Algorithms

    1. Attribute-Based Encryption with Break-Glass

      • Achim D. Brucker, Helmut Petritsch, Stefan G. Weber
      Pages 237-244
    2. On the Security of a Two-Factor Authentication Scheme

      • Luigi Catuogno, Clemente Galdi
      Pages 245-252

Other Volumes

  1. Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices

Keywords

  • FPGA
  • RFID
  • SIP
  • arm processors
  • authentication
  • collision attacks
  • cryptanalysis
  • cryptography
  • information security
  • intrusion detection
  • java card
  • key distribution
  • mobile and ad hoc network
  • smart cards
  • wireless sensor networks
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Dipartimento di Tecnologie dell’ Informazione, Università degli Studi di Milano, Crema, Italy

    Pierangela Samarati

  • Department of Computer Science, Merchant Venturers Building, University of Bristol, Bristol, UK

    Michael Tunstall

  • Institute of IT Security and Security Law, Passau, Germany

    Joachim Posegga

  • Information Security Group, Smart Card Centre, University of London, Surrey, UK

    Konstantinos Markantonakis

  • XLIM, UMR CNRS 6172, University of Limoges, Limoges, France

    Damien Sauveron

Bibliographic Information

  • Book Title: Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices

  • Book Subtitle: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings

  • Editors: Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-12368-9

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: IFIP International Federation for Information Processing 2010

  • Softcover ISBN: 978-3-642-12367-2Published: 09 April 2010

  • eBook ISBN: 978-3-642-12368-9Published: 07 April 2010

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIII, 386

  • Number of Illustrations: 93 b/w illustrations

  • Topics: Computer Communication Networks, IT Operations, Cryptology, Algorithms, Data and Information Security, Computers and Society

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions