Skip to main content
Book cover

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices

4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings

  • Conference proceedings
  • © 2010

Overview

  • Fast-track conference proceedings
  • State-of-the-art research
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6033)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: WISTP 2010.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (30 papers)

  1. Embedded Security

  2. Protocols

  3. Highly Constrained Embedded Systems

  4. Security

  5. Smart Card Security

  6. Algorithms

Other volumes

  1. Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices

Keywords

Editors and Affiliations

  • Dipartimento di Tecnologie dell’ Informazione, Università degli Studi di Milano, Crema, Italy

    Pierangela Samarati

  • Department of Computer Science, Merchant Venturers Building, University of Bristol, Bristol, UK

    Michael Tunstall

  • Institute of IT Security and Security Law, Passau, Germany

    Joachim Posegga

  • Information Security Group, Smart Card Centre, University of London, Surrey, UK

    Konstantinos Markantonakis

  • XLIM, UMR CNRS 6172, University of Limoges, Limoges, France

    Damien Sauveron

Bibliographic Information

Publish with us