Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008José A. Onieva Springer Science & Business Media, 2008. gada 29. apr. - 149 lappuses With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded s- tems are becoming more and more mobile and ubiquitous. They also strongly interact with the physical world. Ensuring the security of these complex and resource-constrained systems is a really challenging research topic. Therefore this Workshop in Information Security Theory and Practices was organized to bring together researchers and practitioners in related areas, and to encourage cooperation between the research and the industrial communities. This was the second edition of WISTP, after the ?rst event in Heraklion, Greece, in 2007. This year again we had a signi?cant number of high-quality submissions coming from many di?erent countries. These submissions re?ected the major topics of the conference, i. e. , smart devices, convergence, and ne- generation networks. Submissions were reviewed by at least three reviewers, in most cases by four, and at least by ?ve for the papers involving Program C- mittee members. This long and rigorousprocess could be achievedthanks to the hard work of the Program Committee members and additional reviewers, listed in the following pages. This led to the selection of high-quality papers that made up the workshop program and are published in these proceedings. A number of posters and short papers were also selected for presentation at the conference. The process was very selective and we would like to thank all those authors who submitted contributions that could not be selected. |
Saturs
Untraceability of RFID Protocols | 1 |
A Graphical PIN Authentication Mechanism with Applications to Smart Cards and LowCost Devices | 16 |
An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information | 36 |
Probabilistic Identification for Hard to Classify Protocol | 49 |
A Selfcertified and SybilFree Framework for Secure Digital Identity Domain Buildup | 64 |
Availability for DHTBased Overlay Networks with Unidirectional Routing | 78 |
Network Smart Card Performing USIM Functionalities in AAA Protocol Architectures | 92 |
Using TPMs to Secure Vehicular AdHoc Networks VANETs | 106 |
Algebra for Capability Based Attack Correlation | 117 |
On the BRIP Algorithms Security for RSA | 136 |
150 | |
Citi izdevumi - Skatīt visu
Bieži izmantoti vārdi un frāzes
3G AAA Server 3G/WLAN 3GPP AAA protocol adversary nodes algorithm anonymous application architecture authentication protocol BitTorrent blind attack BRIP capset challenge Chord classifier collision attacks communication correlation process covert channel credentials cryptographic define denoted devices e-token EAP-AKA example exponentiation extract from:t1 function h-alert hardware hash Heidelberg Heidelberg 2005 identifier identity domain IEEE implementation interworking intrusion detection key-ID LNCS M-attacks modular monitor multiplication node-ID NSC-based number of transcripts objects operation Overlay Networks packet peer-to-peer Power Analysis probability proposed protocol identification pseudonym public key query node random answers replica roots RFID routing table scenario security system self-certified sensors session signature smart cards solution specific Springer Sybil attack Sybil-free techniques traffic trust U(SIM University of Limoges untraceability user secret valid VANET vehicle verified wireless WISTP WLAN Workshop