|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465320003316 |
|
|
Titolo |
Information security theory and practices, smart devices, convergence and next generation networks : second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 : proceedings / / Jose A. Onieva [and three others] (eds.) |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
|
©2008 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2008.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 151 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 5019 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Smart cards |
Computer systems - Access control |
Data protection |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Smart Devices -- Untraceability of RFID Protocols -- A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices -- Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information -- Network Security -- Probabilistic Identification for Hard to Classify Protocol -- A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup -- Availability for DHT-Based Overlay Networks with Unidirectional Routing -- Convergence -- Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures -- Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs) -- Cryptography -- Algebra for Capability Based Attack Correlation -- On the BRIP Algorithms Security for RSA. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008. The 10 revised full papers presented were carefully reviewed and selected from numerous |
|
|
|
|
|
|
|
|
|
|
submissions for inclusion in the book; they examine the rapid development of information technologies and the transition to next generation networks. The papers focus on the security of these complex and resource-constrained systems and are organized in topical sections on smart devices, network security, convergence, and cryptography. |
|
|
|
|
|
| |