Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 14th International Conference on Secure IT Systems, NordSec 2009, held in Oslo, Norway, October 14-16, 2009.

The 20 revised full papers and 8 short papers presented were carefully reviewed and selected from 52 submissions. Under the theme Identity and Privacy in the Internet Age, this year's conference explored policies, strategies and technologies for protecting identities and the growing flow of personal information passing through the Internet and mobile networks under an increasingly serious threat picture. Among the contemporary security issues discussed were Security Services Modeling, Petri Nets, Attack Graphs, Electronic Voting Schemes, Anonymous Payment Schemes, Mobile ID-Protocols, SIM Cards, Network Embedded Systems, Trust, Wireless Sensor Networks, Privacy, Privacy Disclosure Regulations, Financial Cryptography, PIN Verification, Temporal Access Control, Random Number Generators, and some more.

Author(s): Jan Muntermann, Heiko Roßnagel (auth.), Audun Jøsang, Torleiv Maseng, Svein Johan Knapskog (eds.)
Series: Lecture Notes in Computer Science 5838 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 303
Tags: Systems and Data Security; Data Structures, Cryptology and Information Theory; Coding and Information Theory; Data Encryption; Information Systems Applications (incl.Internet); e-Commerce/e-business

Front Matter....Pages -
On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market....Pages 1-14
Facilitating the Adoption of Tor by Focusing on a Promising Target Group....Pages 15-27
A Parallelism-Based Approach to Network Anonymization....Pages 28-43
Security Usability of Petname Systems....Pages 44-59
An Analysis of Widget Security....Pages 60-71
Trade-Offs in Cryptographic Implementations of Temporal Access Control....Pages 72-87
Blunting Differential Attacks on PIN Processing APIs....Pages 88-103
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic....Pages 104-119
An Improved Attack on TKIP....Pages 120-132
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System....Pages 133-147
A Mechanism for Identity Delegation at Authentication Level....Pages 148-162
Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services....Pages 163-178
Towards True Random Number Generation in Mobile Environments....Pages 179-189
Towards Modelling Information Security with Key-Challenge Petri Nets....Pages 190-206
Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011 ....Pages 207-222
Advanced SIM Capabilities Supporting Trust-Based Applications....Pages 223-238
Towards Practical Enforcement Theories....Pages 239-254
Security Analysis of AN.ON’s Payment Scheme....Pages 255-270
Formal Analysis of the Estonian Mobile-ID Protocol....Pages 271-286
Generating In-Line Monitors for Rabin Automata....Pages 287-301
Back Matter....Pages -