Information security theory and practices smart cards, mobile and ubiquitous computing systems : First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, proceedings

With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although th...

Descripción completa

Detalles Bibliográficos
Autores Corporativos: WISTP 2007 (-), International Federation for Information Processing. Technical Committee 6., IFIP WG 8.8 (Smart Cards)
Otros Autores: Sauveron, Damien, editor (editor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Berlin ; Heidelberg ; New York : Springer-Verlag [2007]
Edición:1st ed. 2007.
Colección:Lecture notes in computer science ; 4462.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009714039506719
Tabla de Contenidos:
  • Mobility
  • A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
  • A New Resilient Key Management Protocol for Wireless Sensor Networks
  • Hardware and Cryptography I
  • Efficient Use of Random Delays in Embedded Software
  • Enhanced Doubling Attacks on Signed-All-Bits Set Recoding
  • Privacy
  • Securing the Distribution and Storage of Secrets with Trusted Platform Modules
  • Distributed Certified Information Access for Mobile Devices
  • Cryptography Scheme
  • Linkability of Some Blind Signature Schemes
  • Optimistic Non-repudiation Protocol Analysis
  • Secure Remote User Authentication Scheme Using Bilinear Pairings
  • Cryptanalysis of Some Proxy Signature Schemes Without Certificates
  • Smart Card
  • Performance Evaluation of Java Card Bytecodes
  • Reverse Engineering Java Card Applets Using Power Analysis
  • An Embedded System for Practical Security Analysis of Contactless Smartcards
  • A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies
  • Small Devices
  • Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
  • An Information Flow Verifier for Small Embedded Systems
  • Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks
  • Hardware and Cryptography II
  • Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures
  • CRT RSA Algorithm Protected Against Fault Attacks
  • Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.