Security and Cryptology
IFIP-LNCS Volumes
© 2010
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices
4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings
Editors: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (Eds.)
Free Preview- Fast-track conference proceedings
- State-of-the-art research
- Unique visibility
Buy this book
- Table of contents (30 chapters)
-
-
Efficient and Effective Buffer Overflow Protection on ARM Processors
Pages 1-16
-
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines
Pages 17-30
-
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Pages 31-46
-
A Smart Card Implementation of the McEliece PKC
Pages 47-59
-
Evaluation Metrics of Physical Non-invasive Security
Pages 60-75
-
Table of contents (30 chapters)
Recommended for you

Bibliographic Information
- Bibliographic Information
-
- Book Title
- Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices
- Book Subtitle
- 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings
- Editors
-
- Pierangela Samarati
- Michael Tunstall
- Joachim Posegga
- Konstantinos Markantonakis
- Damien Sauveron
- Series Title
- Security and Cryptology
- Series Volume
- 6033
- Copyright
- 2010
- Publisher
- Springer-Verlag Berlin Heidelberg
- Copyright Holder
- IFIP International Federation for Information Processing
- eBook ISBN
- 978-3-642-12368-9
- DOI
- 10.1007/978-3-642-12368-9
- Softcover ISBN
- 978-3-642-12367-2
- Edition Number
- 1
- Number of Pages
- XIII, 386
- Number of Illustrations
- 93 b/w illustrations
- Topics