Amazon cover image
Image from Amazon.com

Information security theory and practice : security of mobile and cyber-physical systems : 7th IFIP WG 11.2 international workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013 : proceedings / Lorenzo Cavallaro, Dieter Gollmann (eds.).

IFIP WG 11.2 International Workshop on Information Security Theory and Practice �Erakleion, Greece) By: (7th : IFIP WG 11.2 International Workshop on Information Security Theory and Practice (7th : 2013 : Ērakleion, Greece)Contributor(s): Cavallaro, Lorenzo | Gollmann, Dieter | IFIP WG 11.2Material type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 7886. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Heidelberg : Springer, ©2013. Description: 1 online resource (1 volume) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783642385308; 3642385303Other title: WISTP 2013Subject(s): Computer security -- Congresses | Ubiquitous computing -- Congresses | Computer Security | Computer security | Ubiquitous computing | computerwetenschappen | computer sciences | systemen | systems | gegevensbeheer | data management | computernetwerken | computer networks | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Congress. | Electronic books. | Electronic books | Ebook | Conference papers and proceedings. Additional physical formats: Printed edition:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25 | .I54 2013NLM classification: QA 76.9.A25Other classification: 54.62 | 54.32 | 54.80 Online resources: Click here to access online
Contents:
Cryptography and Cryptanalysis -- Multiplicative Homomorphic E-Auction with Formally Provable Security / Kun Peng, Matt Henricksen -- Malleable Signatures for Resource Constrained Platforms / Henrich C. Pöhls [and others] -- Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks / Panagiotis Ilia, George Oikonomou, Theo Tryfonas -- Mobile Security -- URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security / Daniel Schreckling [and others] -- Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphone / Max Günther, Bernd Borchert -- Smart Cards and Embedded Devices -- A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards / Michael Lackner [and others] -- A Forward Privacy Model for RFID Authentication Protocols / Daisuke Moriyama, Miyako Ohkubo, Shin'ichiro Matsuo -- On Secure Embedded Token Design / Simon Hoerder, Kimmo Järvinen, Daniel Page -- Lightweight Authentication Protocol for Low-Cost RFID Tags / Pierre Dusart, Sinaly Traoré.
Summary: This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

Cryptography and Cryptanalysis -- Multiplicative Homomorphic E-Auction with Formally Provable Security / Kun Peng, Matt Henricksen -- Malleable Signatures for Resource Constrained Platforms / Henrich C. Pöhls [and others] -- Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks / Panagiotis Ilia, George Oikonomou, Theo Tryfonas -- Mobile Security -- URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security / Daniel Schreckling [and others] -- Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphone / Max Günther, Bernd Borchert -- Smart Cards and Embedded Devices -- A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards / Michael Lackner [and others] -- A Forward Privacy Model for RFID Authentication Protocols / Daisuke Moriyama, Miyako Ohkubo, Shin'ichiro Matsuo -- On Secure Embedded Token Design / Simon Hoerder, Kimmo Järvinen, Daniel Page -- Lightweight Authentication Protocol for Low-Cost RFID Tags / Pierre Dusart, Sinaly Traoré.

This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.

Powered by Koha