Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP 2009 held in Brussels, Belgium in September 2009.

The 12 revised full papers presented were carefully reviewed and selected from 27 submissions for inclusion in the book; they are organized in topical sections on mobility, attacks and secure implementations, performance and security, and cryptography.

Author(s): Olivier Heen, Gilles Guette, Thomas Genet (auth.), Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater (eds.)
Series: Lecture Notes in Computer Science 5746 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 167
Tags: Data Encryption; Systems and Data Security; Data Structures, Cryptology and Information Theory; Coding and Information Theory; Computer Communication Networks; Symbolic and Algebraic Manipulation

Front Matter....Pages -
On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks....Pages 1-11
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems....Pages 12-27
Privacy-Aware Location Database Service for Granular Queries....Pages 28-37
Algebraic Attacks on RFID Protocols....Pages 38-51
Anti-counterfeiting Using Memory Spots....Pages 52-67
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations....Pages 68-83
Measurement Analysis When Benchmarking Java Card Platforms....Pages 84-94
Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card....Pages 95-111
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks....Pages 112-127
Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks....Pages 128-142
Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure....Pages 143-152
PKIX Certificate Status in Hybrid MANETs....Pages 153-166
Back Matter....Pages -