Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008.

The 10 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book; they examine the rapid development of information technologies and the transition to next generation networks. The papers focus on the security of these complex and resource-constrained systems and are organized in topical sections on smart devices, network security, convergence, and cryptography.

Author(s): Ton van Deursen, Sjouke Mauw, Saša Radomirović (auth.), Jose A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis (eds.)
Series: Lecture Notes in Computer Science 5019 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008

Language: English
Pages: 151
Tags: Data Encryption; Systems and Data Security; Computer Communication Networks; Management of Computing and Information Systems; Computers and Society

Front Matter....Pages -
Untraceability of RFID Protocols....Pages 1-15
A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices....Pages 16-35
Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information....Pages 36-48
Probabilistic Identification for Hard to Classify Protocol....Pages 49-63
A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup....Pages 64-77
Availability for DHT-Based Overlay Networks with Unidirectional Routing....Pages 78-91
Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures....Pages 92-105
Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs)....Pages 106-116
Algebra for Capability Based Attack Correlation....Pages 117-135
On the BRIP Algorithms Security for RSA....Pages 136-149
Back Matter....Pages -