LEADER 06402nam 22009495 450 001 9910483105903321 005 20200701145118.0 010 $a1-280-38621-5 010 $a9786613564139 010 $a3-642-12368-6 024 7 $a10.1007/978-3-642-12368-9 035 $a(CKB)2560000000009132 035 $a(SSID)ssj0000399464 035 $a(PQKBManifestationID)11275095 035 $a(PQKBTitleCode)TC0000399464 035 $a(PQKBWorkID)10384362 035 $a(PQKB)11187680 035 $a(DE-He213)978-3-642-12368-9 035 $a(MiAaPQ)EBC3065195 035 $a(PPN)149073321 035 $a(EXLCZ)992560000000009132 100 $a20100407d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices$b[electronic resource] $e4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings /$fedited by Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIII, 386 p. 93 illus.) 225 1 $aSecurity and Cryptology ;$v6033 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-12367-8 320 $aIncludes bibliographical references and index. 327 $aEmbedded Security -- Efficient and Effective Buffer Overflow Protection on ARM Processors -- Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines -- A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones -- A Smart Card Implementation of the McEliece PKC -- Evaluation Metrics of Physical Non-invasive Security -- Protocols -- Trust in Peer-to-Peer Content Distribution Protocols -- Generic Constructions of Biometric Identity Based Encryption Systems -- Design and Analysis of a Generalized Canvas Protocol -- Highly Constrained Embedded Systems -- Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures -- Practical Schemes for Privacy and Security Enhanced RFID -- MoteAODV ? An AODV Implementation for TinyOS 2.0 -- Security -- Random Number Generation Based on Fingerprints -- Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML -- Fraud Detection for Voice over IP Services on Next-Generation Networks -- Smart Card Security -- Proxy Smart Card Systems -- Can We Support Applications? Evolution in Multi-application Smart Cards by Security-by-Contract? -- Website Credential Storage and Two-Factor Web Authentication with a Java SIM -- Algorithms -- Attribute-Based Encryption with Break-Glass -- On the Security of a Two-Factor Authentication Scheme -- The Design of Secure and Efficient P2PSIP Communication Systems -- Hardware Implementations -- Novel FPGA-Based Signature Matching for Deep Packet Inspection -- Towards Electrical, Integrated Implementations of SIMPL Systems -- A Very Compact Hardware Implementation of the KASUMI Block Cipher -- Embedded Systems -- Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions -- Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions -- Security Analysis of Mobile Phones Used as OTP Generators -- An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks -- Anonymity/Database Security -- The Market Failure of Anonymity Services -- Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios -- Predicting and Preventing Insider Threat in Relational Database Systems. 410 0$aSecurity and Cryptology ;$v6033 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer security 606 $aComputers and civilization 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 608 $aKongress 2010. 608 $aKongress. 608 $aPassau (2010) 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer security. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 676 $a005.8 686 $aDAT 179f$2stub 686 $aDAT 260f$2stub 686 $aDAT 460f$2stub 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aSamarati$b Pierangela$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTunstall$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPosegga$b Joachim$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMarkantonakis$b Konstantinos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSauveron$b Damien$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aWISTP 2010 906 $aBOOK 912 $a9910483105903321 996 $aInformation Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices$92830495 997 $aUNINA