4. WISTP 2010: Passau, Germany
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings
Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron
Springer, Lecture Notes in Computer Science 6033, ISBN: 978-3-642-12367-2
Contents
Embedded Security
Efficient and Effective Buffer Overflow Protection on ARM Processors.
Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens
1-16
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines.
Alexandre Venelli
17-30
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones.
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick Schmidt
31-46
Protocols
Trust in Peer-to-Peer Content Distribution Protocols.
Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs
76-89
Highly Constrained Embedded Systems
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
Michael Braun, Ulrike Meyer, Susanne Wetzel
122-137
Security
Random Number Generation Based on Fingerprints.
Shkodran Gerguri, Václav Matyás Jr., Zdenek Ríha, Ludek Smolík
170-182
Sergio Sánchez García, Ana Gómez Oliva
183-198
Fraud Detection for Voice over IP Services on Next-Generation Networks.
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia Bringas
199-212
Smart Card Security
Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti
213-220
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?
Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci
221-228
Website Credential Storage and Two-Factor Web Authentication with a Java SIM.
Jonathan Hart, Konstantinos Markantonakis, Keith Mayes
229-236
Algorithms
Attribute-Based Encryption with Break-Glass.
Achim D. Brucker, Helmut Petritsch, Stefan G. Weber
237-244
The Design of Secure and Efficient P2PSIP Communication Systems.
Xianghan Zheng, Vladimir A. Oleshchuk
253-260
Hardware Implementations
Novel FPGA-Based Signature Matching for Deep Packet Inspection.
Nitesh B. Guinde, Sotirios G. Ziavras
261-276
Towards Electrical, Integrated Implementations of SIMPL Systems.
Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, György Csaba
277-292
A Very Compact Hardware Implementation of the KASUMI Block Cipher.
Dai Yamamoto, Kouichi Itoh, Jun Yajima
293-307
Embedded Systems
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions.
Ronald Kainda, Ivan Flechais, A. W. Roscoe
308-315
Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner
316-323
Security Analysis of Mobile Phones Used as OTP Generators.
Håvard Raddum, Lars Hopland Nestås, Kjell Jørgen Hole
324-331
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks.
Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater
332-339
Anonymity/Database Security
Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios.
Giovanni Russello, Enrico Scalavino
355-367
Predicting and Preventing Insider Threat in Relational Database Systems.
Qussai Yaseen, Brajendra Panda
368-383