Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices: 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This volume constitutes the refereed proceedings of the 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices, WISTP 2010, held in Passau, Germany, in April 2010. The 20 revised full papers and 10 short papers were carefully reviewed and selected from 69 submissions. They are organized in topical sections on embedded security, protocols, highly constrained embedded systems, security, smart card security, algorithms, hardware implementations, embedded systems and anonymity/database security.

Author(s): Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens (auth.), Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron (eds.)
Series: Lecture Notes in Computer Science 6033 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 386
Tags: Computer Communication Networks; Management of Computing and Information Systems; Data Encryption; Algorithm Analysis and Problem Complexity; Systems and Data Security; Computers and Society

Front Matter....Pages -
Efficient and Effective Buffer Overflow Protection on ARM Processors....Pages 1-16
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines....Pages 17-30
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones....Pages 31-46
A Smart Card Implementation of the McEliece PKC....Pages 47-59
Evaluation Metrics of Physical Non-invasive Security....Pages 60-75
Trust in Peer-to-Peer Content Distribution Protocols....Pages 76-89
Generic Constructions of Biometric Identity Based Encryption Systems....Pages 90-105
Design and Analysis of a Generalized Canvas Protocol....Pages 106-121
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures....Pages 122-137
Practical Schemes for Privacy and Security Enhanced RFID....Pages 138-153
MoteAODV – An AODV Implementation for TinyOS 2.0....Pages 154-169
Random Number Generation Based on Fingerprints....Pages 170-182
Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML....Pages 183-198
Fraud Detection for Voice over IP Services on Next-Generation Networks....Pages 199-212
Proxy Smart Card Systems....Pages 213-220
Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract?....Pages 221-228
Website Credential Storage and Two-Factor Web Authentication with a Java SIM....Pages 229-236
Attribute-Based Encryption with Break-Glass....Pages 237-244
On the Security of a Two-Factor Authentication Scheme....Pages 245-252
The Design of Secure and Efficient P2PSIP Communication Systems....Pages 253-260
Novel FPGA-Based Signature Matching for Deep Packet Inspection....Pages 261-276
Towards Electrical, Integrated Implementations of SIMPL Systems....Pages 277-292
A Very Compact Hardware Implementation of the KASUMI Block Cipher....Pages 293-307
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions....Pages 308-315
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions....Pages 316-323
Security Analysis of Mobile Phones Used as OTP Generators....Pages 324-331
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks....Pages 332-339
The Market Failure of Anonymity Services....Pages 340-354
Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios....Pages 355-367
Predicting and Preventing Insider Threat in Relational Database Systems....Pages 368-383
Back Matter....Pages -