Skip to main content
  • Conference proceedings
  • © 2013

Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems

7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedings

  • Fast-track conference proceedings of WIST 2013

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7886)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISTP: IFIP International Conference on Information Security Theory and Practice

Conference proceedings info: WISTP 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (9 papers)

  1. Front Matter

  2. Cryptography and Cryptanalysis

    1. Malleable Signatures for Resource Constrained Platforms

      • Henrich C. Pöhls, Stefan Peters, Kai Samelin, Joachim Posegga, Hermann de Meer
      Pages 18-33
    2. Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks

      • Panagiotis Ilia, George Oikonomou, Theo Tryfonas
      Pages 34-49
  3. Mobile Security

    1. URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security

      • Daniel Schreckling, Stephan Huber, Focke Höhne, Joachim Posegga
      Pages 50-65
  4. Smart Cards and Embedded Devices

    1. A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards

      • Michael Lackner, Reinhard Berlach, Wolfgang Raschke, Reinhold Weiss, Christian Steger
      Pages 82-97
    2. A Forward Privacy Model for RFID Authentication Protocols

      • Daisuke Moriyama, Miyako Ohkubo, Shin’ichiro Matsuo
      Pages 98-111
    3. On Secure Embedded Token Design

      • Simon Hoerder, Kimmo Järvinen, Daniel Page
      Pages 112-128
    4. Lightweight Authentication Protocol for Low-Cost RFID Tags

      • Pierre Dusart, Sinaly Traoré
      Pages 129-144
  5. Back Matter

Other Volumes

  1. Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems

About this book

This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.

Editors and Affiliations

  • Information Security Group, University of London Egham Hill, Egham, UK

    Lorenzo Cavallaro

  • Institutes of the TU Hamburg-Harburg, Security in Distributed Applications, University of Technology, Hamburg, Germany

    Dieter Gollmann

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access