did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642123672

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices : 4th IFIP WG 11. 2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings

by ; ; ;
  • ISBN13:

    9783642123672

  • ISBN10:

    3642123678

  • Format: Paperback
  • Copyright: 2010-04-15
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $109.00

Summary

This volume constitutes the refereed proceedings of the 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices, WISTP 2010, held in Passau, Germany, in April 2010. The 20 revised full papers and 10 short papers were carefully reviewed and selected from 69 submissions. They are organized in topical sections on embedded security, protocols, highly constrained embedded systems, security, smart card security, algorithms, hardware implementations, embedded systems and anonymity/database security.

Table of Contents

Embedded Security
Efficient and Effective Buffer Overflow Protection on ARM Processorsp. 1
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splinesp. 17
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphonesp. 31
A Smart Card Implementation of the McEliece PKCp. 47
Evaluation Metrics of Physical Non-invasive Securityp. 60
Protocols
Trust in Peer-to-Peer Content Distribution Protocolsp. 76
Generic Constructions of Biometric Identity Based Encryption Systemsp. 90
Design and Analysis of a Generalized Canvas Protocolp. 106
Highly Constrained Embedded Systems
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signaturesp. 122
Practical Schemes for Privacy and Security Enhanced RFID (Extended Abstract)p. 138
MoteAODV - An AODV Implementation for TinyOS 2.0p. 154
Security
Random Number Generation Based on Fingerprintsp. 170
Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAMLp. 183
Fraud Detection for Voice over IP Services on Next-Generation Networksp. 199
Smart Card Security
Proxy Smart Card Systemsp. 213
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?p. 221
Website Credential Storage and Two-Factor Web Authentication with a Java SIMp. 229
Algorithms
Attribute-Based Encryption with Break-Glassp. 237
On the Security of a Two-Factor Authentication Schemep. 245
The Design of Secure and Efficient P2PSIP Communication Systemsp. 253
Hardware Implementations
Novel FPGA-Based Signature Matching for Deep Packet Inspectionp. 261
Towards Electrical, Integrated Implementations of SIMPL Systemsp. 227
A Very Compact Hardware Implementation of the KASUMI Block Cipherp. 293
Embedded Systems
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactionsp. 308
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertionsp. 316
Security Analysis of Mobile Phones Used as OTP Generatorsp. 324
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networksp. 332
Anonymity/Database Security
The Market Failure of Anonymity Servicesp. 340
Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenariosp. 355
Predicting and Preventing Insider Threat in Relational Database Systemsp. 368
Author Indexp. 385
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program