Skip to main content
  • Conference proceedings
  • © 2009

Identity and Privacy in the Internet Age

14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5838)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): NordSec: Nordic Conference on Secure IT Systems

Conference proceedings info: NordSec 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (20 papers)

  1. Front Matter

  2. Session 1: Anonymity and Privacy

    1. Facilitating the Adoption of Tor by Focusing on a Promising Target Group

      • Heiko Roßnagel, Jan Zibuschka, Lexi Pimenides, Thomas Deselaers
      Pages 15-27
    2. Security Usability of Petname Systems

      • Md. Sadek Ferdous, Audun Jøsang, Kuldeep Singh, Ravishankar Borgaonkar
      Pages 44-59
  3. Session 2: Modelling and Design

    1. An Analysis of Widget Security

      • Karsten Peder Holth, Do van Thuan, Ivar Jørstad, Do van Thanh
      Pages 60-71
    2. Blunting Differential Attacks on PIN Processing APIs

      • Riccardo Focardi, Flaminia L. Luccio, Graham Steel
      Pages 88-103
  4. Session 3: Network Layer Security

    1. An Improved Attack on TKIP

      • Finn M. Halvorsen, Olav Haugen, Martin Eian, Stig F. Mjølsnes
      Pages 120-132
  5. Session 4: Security for Mobile Users

    1. A Mechanism for Identity Delegation at Authentication Level

      • Naveed Ahmed, Christian D. Jensen
      Pages 148-162
    2. Towards True Random Number Generation in Mobile Environments

      • Jan Bouda, Jan Krhovjak, Vashek Matyas, Petr Svenda
      Pages 179-189
  6. Session 5: Embedded Systems and Mechanisms

    1. Towards Modelling Information Security with Key-Challenge Petri Nets

      • Mikko Kiviharju, Teijo Venäläinen, Suna Kinnunen
      Pages 190-206
    2. Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011

      • Arne Ansper, Sven Heiberg, Helger Lipmaa, Tom André Øverland, Filip van Laenen
      Pages 207-222
    3. Advanced SIM Capabilities Supporting Trust-Based Applications

      • Thomas Vilarinho, Kjetil Haslum, Josef Noll
      Pages 223-238
    4. Towards Practical Enforcement Theories

      • Nataliia Bielova, Fabio Massacci, Andrea Micheletti
      Pages 239-254
  7. Session 6: Protocols and Protocol Analysis

    1. Security Analysis of AN.ON’s Payment Scheme

      • Benedikt Westermann
      Pages 255-270
    2. Formal Analysis of the Estonian Mobile-ID Protocol

      • Peeter Laud, Meelis Roos
      Pages 271-286

Other Volumes

  1. Identity and Privacy in the Internet Age

About this book

The NordSec workshops were started in 1996 with the aim of bringing together - searchers and practitioners within computer security in the Nordic countries – thereby establishing a forum for discussions and co-operation between universities, industry and computer societies. Since then, the workshop has developed into a fully fledged inter- tional information security conference, held in the Nordic countries on a round robin basis. The 14th Nordic Conference on Secure IT Systems was held in Oslo on 14-16 October 2009. Under the theme Identity and Privacy in the Internet Age, this year's conference explored policies, strategies and technologies for protecting identities and the growing flow of personal information passing through the Internet and mobile n- works under an increasingly serious threat picture. Among the contemporary security issues discussed were security services modeling, Petri nets, attack graphs, electronic voting schemes, anonymous payment schemes, mobile ID-protocols, SIM cards, n- work embedded systems, trust, wireless sensor networks, privacy, privacy disclosure regulations, financial cryptography, PIN verification, temporal access control, random number generators, and some more. As a pre-cursor to the conference proper, the Nordic Security Day on Wednesday 14 October hosted talks by leading representatives from industry, academia and the g- ernment sector, and a press conference was given.

Editors and Affiliations

  • University of Oslo, University Graduate Center, Kjeller, Norway

    Audun Jøsang

  • Norwegian Defence Research Establishment, Kjeller, Norway

    Torleiv Maseng

  • Norwegian University of Science and Technology, Centre for Quantifiable Quality of Service in Communication Systems, Trondheim, Norway

    Svein Johan Knapskog

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access