LEADER 05295nam 22008535 450 001 996465288903316 005 20200702222849.0 010 $a3-642-03944-8 024 7 $a10.1007/978-3-642-03944-7 035 $a(CKB)1000000000772881 035 $a(SSID)ssj0000318290 035 $a(PQKBManifestationID)11923583 035 $a(PQKBTitleCode)TC0000318290 035 $a(PQKBWorkID)10308963 035 $a(PQKB)10538572 035 $a(DE-He213)978-3-642-03944-7 035 $a(MiAaPQ)EBC3064473 035 $a(PPN)139955232 035 $a(EXLCZ)991000000000772881 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks$b[electronic resource] $eThird IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings /$fedited by Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XII, 167 p.) 225 1 $aSecurity and Cryptology ;$v5746 300 $aCopyright by IFIP International Federation for Information Processing. 311 $a3-642-03943-X 320 $aIncludes bibliographical references and index. 327 $aMobility -- On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks -- A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems -- Privacy-Aware Location Database Service for Granular Queries -- Attacks and Secure Implementations -- Algebraic Attacks on RFID Protocols -- Anti-counterfeiting Using Memory Spots -- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations -- Performance and Security -- Measurement Analysis When Benchmarking Java Card Platforms -- Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card -- Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks -- Cryptography -- Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks -- Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure -- PKIX Certificate Status in Hybrid MANETs. 330 $aThis volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP 2009 held in Brussels, Belgium in September 2009. The 12 revised full papers presented were carefully reviewed and selected from 27 submissions for inclusion in the book; they are organized in topical sections on mobility, attacks and secure implementations, performance and security, and cryptography. 410 0$aSecurity and Cryptology ;$v5746 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aComputer security 606 $aData structures (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aComputer science?Mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aSymbolic and Algebraic Manipulation$3https://scigraph.springernature.com/ontologies/product-market-codes/I17052 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aData structures (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer science?Mathematics. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aData Structures and Information Theory. 615 24$aCoding and Information Theory. 615 24$aSymbolic and Algebraic Manipulation. 676 $a005.8 702 $aMarkowitch$b Olivier$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBilas$b Angelos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHoepman$b Jaap-Henk$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMitchell$b Chris J$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aQuisquater$b Jean-Jacques$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 02$aIFIP WG 11.2. 712 12$aWISTP 2009 906 $aBOOK 912 $a996465288903316 996 $aInformation Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks$9773696 997 $aUNISA