Skip to main content
  • Conference proceedings
  • © 2013

Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems

7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedings

  • Fast-track conference proceedings of WIST 2013

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7886)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISTP: IFIP International Conference on Information Security Theory and Practice

Conference proceedings info: WISTP 2013.

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-38530-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 74.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (9 papers)

  1. Front Matter

  2. Cryptography and Cryptanalysis

    1. Malleable Signatures for Resource Constrained Platforms

      • Henrich C. Pöhls, Stefan Peters, Kai Samelin, Joachim Posegga, Hermann de Meer
      Pages 18-33
    2. Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks

      • Panagiotis Ilia, George Oikonomou, Theo Tryfonas
      Pages 34-49
  3. Mobile Security

    1. URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security

      • Daniel Schreckling, Stephan Huber, Focke Höhne, Joachim Posegga
      Pages 50-65
  4. Smart Cards and Embedded Devices

    1. A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards

      • Michael Lackner, Reinhard Berlach, Wolfgang Raschke, Reinhold Weiss, Christian Steger
      Pages 82-97
    2. A Forward Privacy Model for RFID Authentication Protocols

      • Daisuke Moriyama, Miyako Ohkubo, Shin’ichiro Matsuo
      Pages 98-111
    3. On Secure Embedded Token Design

      • Simon Hoerder, Kimmo Järvinen, Daniel Page
      Pages 112-128
    4. Lightweight Authentication Protocol for Low-Cost RFID Tags

      • Pierre Dusart, Sinaly Traoré
      Pages 129-144
  5. Back Matter

Other Volumes

  1. Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems

    7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings

About this book

This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013.
The 9 revised full papers presented together with  two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.

Keywords

  • attacks
  • computer networks
  • mobile devices
  • privacy
  • socio-technical systems

Editors and Affiliations

  • Information Security Group, University of London Egham Hill, Egham, UK

    Lorenzo Cavallaro

  • Institutes of the TU Hamburg-Harburg, Security in Distributed Applications, University of Technology, Hamburg, Germany

    Dieter Gollmann

Bibliographic Information

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • ISBN: 978-3-642-38530-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 74.99
Price excludes VAT (USA)