Skip to main content
  • Conference proceedings
  • © 2009

Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks

Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5746)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISTP: IFIP International Conference on Information Security Theory and Practice

Conference proceedings info: WISTP 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (12 papers)

  1. Front Matter

  2. Mobility

    1. On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks

      • Olivier Heen, Gilles Guette, Thomas Genet
      Pages 1-11
    2. A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems

      • Marc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-Díaz
      Pages 12-27
    3. Privacy-Aware Location Database Service for Granular Queries

      • Shinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima
      Pages 28-37
  3. Attacks and Secure Implementations

    1. Algebraic Attacks on RFID Protocols

      • Ton van Deursen, Saša Radomirović
      Pages 38-51
    2. Anti-counterfeiting Using Memory Spots

      • Helen Balinsky, Edward McDonnell, Liqun Chen, Keith Harrison
      Pages 52-67
    3. On Second-Order Fault Analysis Resistance for CRT-RSA Implementations

      • Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra
      Pages 68-83
  4. Performance and Security

    1. Measurement Analysis When Benchmarking Java Card Platforms

      • Pierre Paradinas, Julien Cordry, Samia Bouzefrane
      Pages 84-94
    2. Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks

      • Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich
      Pages 112-127
  5. Cryptography

    1. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

      • J. A. M. Naranjo, J. A. López-Ramos, L. G. Casado
      Pages 128-142
    2. PKIX Certificate Status in Hybrid MANETs

      • Jose L. Muñoz, Oscar Esparza, Carlos Gañán, Javier Parra-Arnau
      Pages 153-166
  6. Back Matter

Other Volumes

  1. Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks

About this book

This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September 2009. WISTP 2009 was the third int- national workshop devoted to information security theory and practice. WISTP 2009 built on the successful WISTP 2007 and 2008 conferences, held in Heraklion, Crete, Greece and Seville, Spain in May 2007 and May 2008, - spectively. The proceedings of WISTP 2007 and WISTP 2008 were published as volumes 4462 and 5019 of the Lecture Notes in Computer Science series. This workshop received the following support: – Co-sponsored by IFIP WG 11. 2 Small System Security – Co-sponsored by VDE ITG – Technical sponsorship of the IEEE Systems, Man & Cybernetics Society – Supported by the Technical Committee on Systems Safety and Security – Organized in cooperation with the ACM SIGSAC – Supported by ENISA – Supported by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) These proceedings contain 12 original papers covering a range of theoretical and practical topics in information security. For the purposes of the organi- tion of the WISTP program, the papers were divided into four main categories, namely: – Mobility – Attacks and Secure Implementations – Performance and Security – Cryptography The12papersincludedherewereselectedfromatotalof27submissions. The refereeing process was rigorous,involving at least three (and mostly four or ?ve) independent reports being prepared for each submission.

Editors and Affiliations

  • Université Libre de Bruxelles, Bruxelles, Belgium

    Olivier Markowitch

  • Institute of Computer Science (ICS), Foundation for Research and Technology - Hellas (FORTH), Vassilika Vouton, Greece

    Angelos Bilas

  • TNO, Eemsgolaan 3, P O Box 1416, 9701 BK Groningen, The Netherlands and Institute for Computing and Information Sciences, Radboud University Nijmegen, P.O. Box 9010, 6500, GL Nijmegen, The Netherlands

    Jaap-Henk Hoepman

  • Information Security Group, Royal Holloway University of London, Egham, UK

    Chris J. Mitchell

  • Microelectronics Laboratory, Université Catholique de Louvain, Louvain-la-Neuve, Belgium

    Jean-Jacques Quisquater

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access