


default search action
4. WISTP 2010: Passau, Germany
- Pierangela Samarati, Michael Tunstall

, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron:
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings. Lecture Notes in Computer Science 6033, Springer 2010, ISBN 978-3-642-12367-2
Embedded Security
- Raoul Strackx, Yves Younan, Pieter Philippaerts

, Frank Piessens:
Efficient and Effective Buffer Overflow Protection on ARM Processors. 1-16 - Alexandre Venelli:

Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines. 17-30 - Tansu Alpcan

, Christian Bauckhage
, Aubrey-Derrick Schmidt:
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones. 31-46 - Falko Strenzke:

A Smart Card Implementation of the McEliece PKC. 47-59 - Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan:

Evaluation Metrics of Physical Non-invasive Security. 60-75
Protocols
- Nicolai Kuntze, Carsten Rudolph

, Andreas Fuchs:
Trust in Peer-to-Peer Content Distribution Protocols. 76-89 - Neyire Deniz Sarier

:
Generic Constructions of Biometric Identity Based Encryption Systems. 90-105 - Marián Novotný:

Design and Analysis of a Generalized Canvas Protocol. 106-121
Highly Constrained Embedded Systems
- Michael Braun, Ulrike Meyer, Susanne Wetzel:

Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures. 122-137 - Jaap-Henk Hoepman, Rieks Joosten:

Practical Schemes for Privacy and Security Enhanced RFID. 138-153 - Werner Backes, Jared Cordasco:

MoteAODV - An AODV Implementation for TinyOS 2.0. 154-169
Security
- Shkodran Gerguri, Václav Matyás Jr., Zdenek Ríha, Ludek Smolík:

Random Number Generation Based on Fingerprints. 170-182 - Sergio Sánchez García, Ana Gómez Oliva

:
Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML. 183-198 - Igor Ruiz-Agundez, Yoseba K. Penya

, Pablo García Bringas
:
Fraud Detection for Voice over IP Services on Next-Generation Networks. 199-212
Smart Card Security
- Giuseppe Cattaneo

, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti
:
Proxy Smart Card Systems. 213-220 - Nicola Dragoni

, Olga Gadyatskaya, Fabio Massacci
:
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? 221-228 - Jonathan Hart, Konstantinos Markantonakis

, Keith Mayes:
Website Credential Storage and Two-Factor Web Authentication with a Java SIM. 229-236
Algorithms
- Achim D. Brucker

, Helmut Petritsch, Stefan G. Weber:
Attribute-Based Encryption with Break-Glass. 237-244 - Luigi Catuogno

, Clemente Galdi
:
On the Security of a Two-Factor Authentication Scheme. 245-252 - Xianghan Zheng, Vladimir A. Oleshchuk:

The Design of Secure and Efficient P2PSIP Communication Systems. 253-260
Hardware Implementations
- Nitesh B. Guinde, Sotirios G. Ziavras

:
Novel FPGA-Based Signature Matching for Deep Packet Inspection. 261-276 - Ulrich Rührmair, Qingqing Chen, Martin Stutzmann

, Paolo Lugli, Ulf Schlichtmann
, György Csaba
:
Towards Electrical, Integrated Implementations of SIMPL Systems. 277-292 - Dai Yamamoto, Kouichi Itoh, Jun Yajima

:
A Very Compact Hardware Implementation of the KASUMI Block Cipher. 293-307
Embedded Systems
- Ronald Kainda, Ivan Flechais, A. W. Roscoe:

Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions. 308-315 - Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner:

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions. 316-323 - Håvard Raddum

, Lars Hopland Nestås, Kjell Jørgen Hole:
Security Analysis of Mobile Phones Used as OTP Generators. 324-331 - Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic

, Amparo Fúster-Sabater:
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. 332-339
Anonymity/Database Security
- Heiko Rossnagel

:
The Market Failure of Anonymity Services. 340-354 - Giovanni Russello, Enrico Scalavino:

Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios. 355-367 - Qussai Yaseen

, Brajendra Panda:
Predicting and Preventing Insider Threat in Relational Database Systems. 368-383

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














