Skip to main content
  • Conference proceedings
  • © 2011

Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication

5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings

  • State-of-the-art research

  • Fast-track conference proceedings

  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6633)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISTP: IFIP International Conference on Information Security Theory and Practice

Conference proceedings info: WISTP 2011.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (28 papers)

  1. Front Matter

  2. Keynote Speech

    1. Can Code Polymorphism Limit Information Leakage?

      • Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall
      Pages 1-21
  3. Mobile Authentication and Access Control

    1. Mobile Electronic Identity: Securing Payment on Mobile Phones

      • Chen Bangdao, A. W. Roscoe
      Pages 22-37
  4. Lightweight Authentication

    1. SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key

      • Chunhua Chen, Chris J. Mitchell, Shaohua Tang
      Pages 54-68
    2. Affiliation-Hiding Authentication with Minimal Bandwidth Consumption

      • Mark Manulis, Bertram Poettering
      Pages 85-99
  5. Algorithms

    1. Formal Framework for the Evaluation of Waveform Resynchronization Algorithms

      • Sylvain Guilley, Karim Khalfallah, Victor Lomne, Jean-Luc Danger
      Pages 100-115
    2. Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library

      • Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
      Pages 116-127
    3. Information Leakage Discovery Techniques to Enhance Secure Chip Design

      • Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia
      Pages 128-143
  6. Hardware Implementation

    1. A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines

      • Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer
      Pages 144-159
    2. An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture

      • Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page
      Pages 160-174
    3. A Comparison of Post-Processing Techniques for Biased Random Number Generators

      • Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik-How Tan
      Pages 175-190
  7. Security and Cryptography

    1. AES Variants Secure against Related-Key Differential and Boomerang Attacks

      • Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann
      Pages 191-207
    2. Leakage Squeezing Countermeasure against High-Order Attacks

      • Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger
      Pages 208-223
  8. Security Attacks and Measures (Short Papers)

    1. Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault

      • Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali
      Pages 224-233
    2. Entropy of Selectively Encrypted Strings

      • Reine Lundin, Stefan Lindskog
      Pages 234-243
    3. Practical Attacks on HB and HB+ Protocols

      • Zbigniew Gołębiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada
      Pages 244-253
    4. Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard

      • Mohammad Hassan Habibi, Mahdi R. Alagheband, Mohammad Reza Aref
      Pages 254-263
  9. Security Attacks

    1. A SMS-Based Mobile Botnet Using Flooding Algorithm

      • Jingyu Hua, Kouichi Sakurai
      Pages 264-279

Other Volumes

  1. Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication

About this book

This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile application security and privacy.

Keywords

  • Web of trust
  • authorization
  • differential cryptanalysis
  • semantic firewall
  • wireless mesh networks
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, Crema (CR), Italy

    Claudio A. Ardagna

  • Institute for Infocomm Research, South Tower, Singapore

    Jianying Zhou

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions