Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems
First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007
Editors: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (Eds.)
Free PreviewBuy this book
- About this book
-
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin- lated disciplines and encourage interchange and practical co-operation between academia and industry. Although this is the ?rst ever WISTP event, the response from researchers wassuperbwithover68paperssubmittedforpotentialinclusionintheworkshop and proceedings. The submissions were reviewed by at least three reviewers, in most cases by four, and for program committee (PC) papers at least ?ve reviewers. This long and rigorous process was only possible thanks to the hard work of the PC members and additional reviewers, listed in the following pages. We would like to express our gratitude to the PC members, who were very supportive from the very beginning of this project. Thanks are also due to the additional expert reviewers who helped the PC to select the ?nal 20 workshop papers for publication in the proceedings. Of course we highly appreciate the e?orts of all the authors who submitted papers to WISTP 2007. We hope they will contribute again to a future edition and encourage others to do so.
- Table of contents (20 chapters)
-
-
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
Pages 1-13
-
A New Resilient Key Management Protocol for Wireless Sensor Networks
Pages 14-26
-
Efficient Use of Random Delays in Embedded Software
Pages 27-38
-
Enhanced Doubling Attacks on Signed-All-Bits Set Recoding
Pages 39-52
-
Securing the Distribution and Storage of Secrets with Trusted Platform Modules
Pages 53-66
-
Table of contents (20 chapters)
Recommended for you

Bibliographic Information
- Bibliographic Information
-
- Book Title
- Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems
- Book Subtitle
- First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007
- Editors
-
- Damien Sauveron
- Konstantinos Markantonakis
- Angelos Bilas
- Jean-Jacques Quisquater
- Series Title
- Security and Cryptology
- Series Volume
- 4462
- Copyright
- 2007
- Publisher
- Springer-Verlag Berlin Heidelberg
- Copyright Holder
- IFIP International Federation for Information Processing
- eBook ISBN
- 978-3-540-72354-7
- DOI
- 10.1007/978-3-540-72354-7
- Softcover ISBN
- 978-3-540-72353-0
- Edition Number
- 1
- Number of Pages
- XII, 255
- Topics