03936nam 2200697Ia 450 991048323720332120200520144314.03-642-03944-810.1007/978-3-642-03944-7(CKB)1000000000772881(SSID)ssj0000318290(PQKBManifestationID)11923583(PQKBTitleCode)TC0000318290(PQKBWorkID)10308963(PQKB)10538572(DE-He213)978-3-642-03944-7(MiAaPQ)EBC3064473(PPN)139955232(EXLCZ)99100000000077288120090909d2009 uy 0engurnn|008mamaatxtccrInformation security theory and practice smart devices, pervasive systems, and ubiquitous networks : third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 : proceedings /Olivier Markowitch ... [et al.] (eds.)1st ed. 2009.Berlin ;New York Springerc20091 online resource (XII, 167 p.) Lecture notes in computer science,0302-9743 ;5746LNCS sublibrary. SL 4, Security and cryptologyCopyright by IFIP International Federation for Information Processing.3-642-03943-X Includes bibliographical references and index.Mobility -- On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks -- A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems -- Privacy-Aware Location Database Service for Granular Queries -- Attacks and Secure Implementations -- Algebraic Attacks on RFID Protocols -- Anti-counterfeiting Using Memory Spots -- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations -- Performance and Security -- Measurement Analysis When Benchmarking Java Card Platforms -- Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card -- Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks -- Cryptography -- Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks -- Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure -- PKIX Certificate Status in Hybrid MANETs.This volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP 2009 held in Brussels, Belgium in September 2009. The 12 revised full papers presented were carefully reviewed and selected from 27 submissions for inclusion in the book; they are organized in topical sections on mobility, attacks and secure implementations, performance and security, and cryptography.Lecture notes in computer science ;5746.LNCS sublibrary.SL 4,Security and cryptology.WISTP 2009IFIP WG 11.2 International Workshop, WISTP 2009Data protectionCongressesComputer systemsAccess controlCongressesSmart cardsCongressesMobile computingSecurity measuresCongressesUbiquitous computingSecurity measuresCongressesData protectionComputer systemsAccess controlSmart cardsMobile computingSecurity measuresUbiquitous computingSecurity measures005.8Markowitch Olivier1756228IFIP WG 11.2.WISTP 2009MiAaPQMiAaPQMiAaPQBOOK9910483237203321Information security theory and practice4193442UNINA