Skip to main content
  • Conference proceedings
  • © 2007

Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4462)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISTP: IFIP International Conference on Information Security Theory and Practice

Conference proceedings info: WISTP 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (20 papers)

  1. Front Matter

  2. Mobility

    1. A New Resilient Key Management Protocol for Wireless Sensor Networks

      • Chakib Bekara, Maryline Laurent-Maknavicius
      Pages 14-26
  3. Hardware and Cryptography I

    1. Efficient Use of Random Delays in Embedded Software

      • Michael Tunstall, Olivier Benoit
      Pages 27-38
    2. Enhanced Doubling Attacks on Signed-All-Bits Set Recoding

      • HeeSeok Kim, Tae Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Ho Won Kim, Jongin Lim
      Pages 39-52
  4. Privacy

    1. Securing the Distribution and Storage of Secrets with Trusted Platform Modules

      • Paul E. Sevinç, Mario Strasser, David Basin
      Pages 53-66
    2. Distributed Certified Information Access for Mobile Devices

      • Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano
      Pages 67-79
  5. Cryptography Scheme

    1. Linkability of Some Blind Signature Schemes

      • Swee-Huay Heng, Wun-She Yap, Khoongming Khoo
      Pages 80-89
    2. Optimistic Non-repudiation Protocol Analysis

      • Judson Santiago, Laurent Vigneron
      Pages 90-101
    3. Secure Remote User Authentication Scheme Using Bilinear Pairings

      • Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo
      Pages 102-114
    4. Cryptanalysis of Some Proxy Signature Schemes Without Certificates

      • Wun-She Yap, Swee-Huay Heng, Bok-Min Goi
      Pages 115-126
  6. Smart Card

    1. Performance Evaluation of Java Card Bytecodes

      • Pierre Paradinas, Julien Cordry, Samia Bouzefrane
      Pages 127-137
    2. Reverse Engineering Java Card Applets Using Power Analysis

      • Dennis Vermoen, Marc Witteman, Georgi N. Gaydadjiev
      Pages 138-149
    3. An Embedded System for Practical Security Analysis of Contactless Smartcards

      • Timo Kasper, Dario Carluccio, Christof Paar
      Pages 150-160
  7. Small Devices

    1. Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication

      • Walter Bamberger, Oliver Welter, Stephan Spitz
      Pages 175-188
    2. An Information Flow Verifier for Small Embedded Systems

      • Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl
      Pages 189-201
    3. Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks

      • Nicolas Fournel, Marine Minier, Stéphane Ubéda
      Pages 202-214
  8. Hardware and Cryptography II

    1. Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures

      • Chong Hee Kim, Jean-Jacques Quisquater
      Pages 215-228
    2. CRT RSA Algorithm Protected Against Fault Attacks

      • Arnaud Boscher, Robert Naciri, Emmanuel Prouff
      Pages 229-243

Other Volumes

  1. Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

About this book

With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin- lated disciplines and encourage interchange and practical co-operation between academia and industry. Although this is the ?rst ever WISTP event, the response from researchers wassuperbwithover68paperssubmittedforpotentialinclusionintheworkshop and proceedings. The submissions were reviewed by at least three reviewers, in most cases by four, and for program committee (PC) papers at least ?ve reviewers. This long and rigorous process was only possible thanks to the hard work of the PC members and additional reviewers, listed in the following pages. We would like to express our gratitude to the PC members, who were very supportive from the very beginning of this project. Thanks are also due to the additional expert reviewers who helped the PC to select the ?nal 20 workshop papers for publication in the proceedings. Of course we highly appreciate the e?orts of all the authors who submitted papers to WISTP 2007. We hope they will contribute again to a future edition and encourage others to do so.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access