IFIP TC6 Open Digital Library

6. WISTP 2012: Egham, UK

Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings

Ioannis G. Askoxylakis, Henrich Christopher Pöhls, Joachim Posegga

Springer, Lecture Notes in Computer Science 7322, ISBN: 978-3-642-30954-0



Contents

Keynotes

Recent Developments in Low-Level Software Security.

Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef, Frank Piessens

 1-16

Towards a C2I Platform for Combating the Cyber-Threat.

Paul Kearney

 17-19

Veracity, Plausibility, and Reputation.

Dieter Gollmann

 20-28

Protocols

Another Fallen Hash-Based RFID Authentication Protocol.

Julio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi

 29-37

Protocols (Short Papers)

HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network.

G. Kirubavathi Venkatesh, R. Anitha Nadarajan

 38-48

How to Break EAP-MD5.

Fanbao Liu, Tao Xie

 49-57

Privacy

Privacy Preserving Social Network Publication on Bipartite Graphs.

Jian Zhou, Jiwu Jing, Ji Xiang, Lei Wang

 58-70

Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications.

Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, Michaela Kauer

 71-86

Privacy (Short Paper)

Privacy Preservation of User History Graph.

Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake

 87-96

Policy and Access Control

HiPoLDS: A Security Policy Language for Distributed Systems.

Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Oliveira, Yves Roudier

 97-112

ROAC: A Role-Oriented Access Control Model.

Nezar Nassr, Eric Steegmans

 113-127

Multi-Party Computation

Optimal Parameters for Efficient Two-Party Computation Protocols.

Chaya Ganesh, C. Pandu Rangan

 128-143

Assisting Server for Secure Multi-Party Computation.

Jens-Matthias Bohli, Wenting Li, Jan Seedorf

 144-159

Cryptography (Short Papers)

An Efficient Lattice-Based Secret Sharing Construction.

Rachid El Bansarkhani, Mohammed Meziani

 160-168

On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems.

Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, Jean-Luc Danger

 169-178

Impossible Differential Cryptanalysis of Reduced-Round LBlock.

Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci

 179-188

Mobile Security

Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices.

Johann Großschädl, Dan Page, Stefan Tillich

 189-207

Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android.

Daniel Schreckling, Joachim Posegga, Johannes Köstler, Matthias Schaff

 208-223