LEADER 06229nam 22008535 450 001 9910483739103321 005 20251226195823.0 010 $a3-540-72354-4 024 7 $a10.1007/978-3-540-72354-7 035 $a(CKB)1000000000490683 035 $a(EBL)3061522 035 $a(SSID)ssj0000318291 035 $a(PQKBManifestationID)11266629 035 $a(PQKBTitleCode)TC0000318291 035 $a(PQKBWorkID)10310175 035 $a(PQKB)10281170 035 $a(DE-He213)978-3-540-72354-7 035 $a(MiAaPQ)EBC3061522 035 $a(MiAaPQ)EBC6711189 035 $a(Au-PeEL)EBL6711189 035 $a(OCoLC)1134826991 035 $a(PPN)123727448 035 $a(Association for Computing Machinery)10.5555/1763190 035 $a(EXLCZ)991000000000490683 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems $eFirst IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 /$fedited by Damien Sauveron, Konstantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (260 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4462 300 $aDescription based upon print version of record. 311 08$a3-540-72353-6 320 $aIncludes bibliographical references and index. 327 $aMobility -- A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks -- A New Resilient Key Management Protocol for Wireless Sensor Networks -- Hardware and Cryptography I -- Efficient Use of Random Delays in Embedded Software -- Enhanced Doubling Attacks on Signed-All-Bits Set Recoding -- Privacy -- Securing the Distribution and Storage of Secrets with Trusted Platform Modules -- Distributed Certified Information Access for Mobile Devices -- Cryptography Scheme -- Linkability of Some Blind Signature Schemes -- Optimistic Non-repudiation Protocol Analysis -- Secure Remote User Authentication Scheme Using Bilinear Pairings -- Cryptanalysis of Some Proxy Signature Schemes Without Certificates -- Smart Card -- Performance Evaluation of Java Card Bytecodes -- Reverse Engineering Java Card Applets Using Power Analysis -- An Embedded System for Practical Security Analysis of Contactless Smartcards -- A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies -- Small Devices -- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication -- An Information Flow Verifier for Small Embedded Systems -- Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks -- Hardware and Cryptography II -- Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures -- CRT RSA Algorithm Protected Against Fault Attacks -- Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks. 330 $aWith the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin- lated disciplines and encourage interchange and practical co-operation between academia and industry. Although this is the ?rst ever WISTP event, the response from researchers wassuperbwithover68paperssubmittedforpotentialinclusionintheworkshop and proceedings. The submissions were reviewed by at least three reviewers, in most cases by four, and for program committee (PC) papers at least ?ve reviewers. This long and rigorous process was only possible thanks to the hard work of the PC members and additional reviewers, listed in the following pages. We would like to express our gratitude to the PC members, who were very supportive from the very beginning of this project. Thanks are also due to the additional expert reviewers who helped the PC to select the ?nal 20 workshop papers for publication in the proceedings. Of course we highly appreciate the e?orts of all the authors who submitted papers to WISTP 2007. We hope they will contribute again to a future edition and encourage others to do so. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4462 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aData and Information Security 606 $aCryptology 606 $aComputer Communication Networks 606 $aIT Operations 606 $aComputers and Society 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aIT Operations. 615 24$aComputers and Society. 676 $a005.8 702 $aSauveron$b Damien 712 02$aInternational Federation for Information Processing.$bTechnical Committee 6. 712 02$aIFIP WG 8.8 (Smart Cards) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483739103321 996 $aInformation Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems$9772603 997 $aUNINA