With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin- lated disciplines and encourage interchange and practical co-operation between academia and industry. Although this is the ?rst ever WISTP event, the response from researchers wassuperbwithover68paperssubmittedforpotentialinclusionintheworkshop and proceedings. The submissions were reviewed by at least three reviewers, in most cases by four, and for program committee (PC) papers at least ?ve reviewers. This long and rigorous process was only possible thanks to the hard work of the PC members and additional reviewers, listed in the following pages. We would like to express our gratitude to the PC members, who were very supportive from the very beginning of this project. Thanks are also due to the additional expert reviewers who helped the PC to select the ?nal 20 workshop papers for publication in the proceedings. Of course we highly appreciate the e?orts of all the authors who submitted papers to WISTP 2007. We hope they will contribute again to a future edition and encourage others to do so.
Author(s): Eve Atallah, Serge Chaumette (auth.), Damien Sauveron, Konstantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater (eds.)
Series: Lecture Notes in Computer Science 4462 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007
Language: English
Pages: 255
Tags: Data Encryption; Systems and Data Security; Computer Communication Networks; Management of Computing and Information Systems; Computers and Society
Front Matter....Pages -
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks....Pages 1-13
A New Resilient Key Management Protocol for Wireless Sensor Networks....Pages 14-26
Efficient Use of Random Delays in Embedded Software....Pages 27-38
Enhanced Doubling Attacks on Signed-All-Bits Set Recoding....Pages 39-52
Securing the Distribution and Storage of Secrets with Trusted Platform Modules....Pages 53-66
Distributed Certified Information Access for Mobile Devices....Pages 67-79
Linkability of Some Blind Signature Schemes....Pages 80-89
Optimistic Non-repudiation Protocol Analysis....Pages 90-101
Secure Remote User Authentication Scheme Using Bilinear Pairings....Pages 102-114
Cryptanalysis of Some Proxy Signature Schemes Without Certificates....Pages 115-126
Performance Evaluation of Java Card Bytecodes....Pages 127-137
Reverse Engineering Java Card Applets Using Power Analysis....Pages 138-149
An Embedded System for Practical Security Analysis of Contactless Smartcards....Pages 150-160
A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies....Pages 161-174
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication....Pages 175-188
An Information Flow Verifier for Small Embedded Systems....Pages 189-201
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks....Pages 202-214
Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures....Pages 215-228
CRT RSA Algorithm Protected Against Fault Attacks....Pages 229-243
Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks....Pages 244-253
Back Matter....Pages -