05295nam 22008535 450 99646528890331620200702222849.03-642-03944-810.1007/978-3-642-03944-7(CKB)1000000000772881(SSID)ssj0000318290(PQKBManifestationID)11923583(PQKBTitleCode)TC0000318290(PQKBWorkID)10308963(PQKB)10538572(DE-He213)978-3-642-03944-7(MiAaPQ)EBC3064473(PPN)139955232(EXLCZ)99100000000077288120100301d2009 u| 0engurnn|008mamaatxtccrInformation Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks[electronic resource] Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings /edited by Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (XII, 167 p.) Security and Cryptology ;5746Copyright by IFIP International Federation for Information Processing.3-642-03943-X Includes bibliographical references and index.Mobility -- On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks -- A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems -- Privacy-Aware Location Database Service for Granular Queries -- Attacks and Secure Implementations -- Algebraic Attacks on RFID Protocols -- Anti-counterfeiting Using Memory Spots -- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations -- Performance and Security -- Measurement Analysis When Benchmarking Java Card Platforms -- Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card -- Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks -- Cryptography -- Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks -- Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure -- PKIX Certificate Status in Hybrid MANETs.This volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP 2009 held in Brussels, Belgium in September 2009. The 12 revised full papers presented were carefully reviewed and selected from 27 submissions for inclusion in the book; they are organized in topical sections on mobility, attacks and secure implementations, performance and security, and cryptography.Security and Cryptology ;5746Data encryption (Computer science)Computer communication systemsComputer securityData structures (Computer science)Coding theoryInformation theoryComputer science—MathematicsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Symbolic and Algebraic Manipulationhttps://scigraph.springernature.com/ontologies/product-market-codes/I17052Data encryption (Computer science).Computer communication systems.Computer security.Data structures (Computer science).Coding theory.Information theory.Computer science—Mathematics.Cryptology.Computer Communication Networks.Systems and Data Security.Data Structures and Information Theory.Coding and Information Theory.Symbolic and Algebraic Manipulation.005.8Markowitch Olivieredthttp://id.loc.gov/vocabulary/relators/edtBilas Angelosedthttp://id.loc.gov/vocabulary/relators/edtHoepman Jaap-Henkedthttp://id.loc.gov/vocabulary/relators/edtMitchell Chris Jedthttp://id.loc.gov/vocabulary/relators/edtQuisquater Jean-Jacquesedthttp://id.loc.gov/vocabulary/relators/edtIFIP WG 11.2.WISTP 2009BOOK996465288903316Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks773696UNISA