IFIP TC6 Open Digital Library

1. WISTP 2007: Heraklion, Crete, Greece

Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings

Damien Sauveron, Constantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater

Springer, Lecture Notes in Computer Science 4462, ISBN: 978-3-540-72353-0



Contents

Mobility

A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks.

Eve Atallah, Serge Chaumette

 1-13

A New Resilient Key Management Protocol for Wireless Sensor Networks.

Chakib Bekara, Maryline Laurent-Maknavicius

 14-26

Hardware and Cryptography I

Efficient Use of Random Delays in Embedded Software.

Michael Tunstall, Olivier Benoît

 27-38

Enhanced Doubling Attacks on Signed-All-Bits Set Recoding.

HeeSeok Kim, Tae Hyun Kim 0003, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim

 39-52

Privacy

Securing the Distribution and Storage of Secrets with Trusted Platform Modules.

Paul E. Sevinç, Mario Strasser, David A. Basin

 53-66

Distributed Certified Information Access for Mobile Devices.

Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano

 67-79

Cryptography Scheme

Linkability of Some Blind Signature Schemes.

Swee-Huay Heng, Wun-She Yap, Khoongming Khoo

 80-89

Optimistic Non-repudiation Protocol Analysis.

Judson Santiago, Laurent Vigneron

 90-101

Secure Remote User Authentication Scheme Using Bilinear Pairings.

Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo

 102-114

Cryptanalysis of Some Proxy Signature Schemes Without Certificates.

Wun-She Yap, Swee-Huay Heng, Bok-Min Goi

 115-126

Smart Card

Performance Evaluation of Java Card Bytecodes.

Pierre Paradinas, Julien Cordry, Samia Bouzefrane

 127-137

Reverse Engineering Java Card Applets Using Power Analysis.

Dennis Vermoen, Marc F. Witteman, Georgi Gaydadjiev

 138-149

An Embedded System for Practical Security Analysis of Contactless Smartcards.

Timo Kasper, Dario Carluccio, Christof Paar

 150-160

A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies.

Kevin Eagles, Constantinos Markantonakis, Keith Mayes

 161-174

Small Devices

Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication.

Walter Bamberger, Oliver Welter, Stephan Spitz

 175-188

An Information Flow Verifier for Small Embedded Systems.

Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl

 189-201

Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks.

Nicolas Fournel, Marine Minier, Stéphane Ubéda

 202-214

Hardware and Cryptography II

Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures.

Chong Hee Kim, Jean-Jacques Quisquater

 215-228

CRT RSA Algorithm Protected Against Fault Attacks.

Arnaud Boscher, Robert Naciri, Emmanuel Prouff

 229-243

Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.

Frank Vater, Steffen Peter, Peter Langendörfer

 244-253