Normal view MARC view ISBD view

Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks [electronic resource] : Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 / edited by José A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis.

Contributor(s): Onieva, José A [editor.] | Sauveron, Damien [editor.] | Chaumette, Serge [editor.] | Gollmann, Dieter [editor.] | Markantonakis, Konstantinos [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 5019Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008Edition: 1st ed. 2008.Description: XII, 151 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540799665.Subject(s): Data protection | Computer networks  | Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Computers and civilization | Data and Information Security | Computer Communication Networks | Cryptology | IT Operations | Computers and SocietyAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Smart Devices -- Untraceability of RFID Protocols -- A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices -- Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information -- Network Security -- Probabilistic Identification for Hard to Classify Protocol -- A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup -- Availability for DHT-Based Overlay Networks with Unidirectional Routing -- Convergence -- Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures -- Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs) -- Cryptography -- Algebra for Capability Based Attack Correlation -- On the BRIP Algorithms Security for RSA.
In: Springer Nature eBookSummary: This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008. The 10 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book; they examine the rapid development of information technologies and the transition to next generation networks. The papers focus on the security of these complex and resource-constrained systems and are organized in topical sections on smart devices, network security, convergence, and cryptography.
    average rating: 0.0 (0 votes)
No physical items for this record

Smart Devices -- Untraceability of RFID Protocols -- A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices -- Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information -- Network Security -- Probabilistic Identification for Hard to Classify Protocol -- A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup -- Availability for DHT-Based Overlay Networks with Unidirectional Routing -- Convergence -- Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures -- Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs) -- Cryptography -- Algebra for Capability Based Attack Correlation -- On the BRIP Algorithms Security for RSA.

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008. The 10 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book; they examine the rapid development of information technologies and the transition to next generation networks. The papers focus on the security of these complex and resource-constrained systems and are organized in topical sections on smart devices, network security, convergence, and cryptography.

There are no comments for this item.

Log in to your account to post a comment.