LEADER 03733nam 2200697 450 001 996465320003316 005 20211008133714.0 010 $a3-540-79966-4 024 7 $a10.1007/978-3-540-79966-5 035 $a(CKB)1000000000440628 035 $a(SSID)ssj0000318292 035 $a(PQKBManifestationID)11231739 035 $a(PQKBTitleCode)TC0000318292 035 $a(PQKBWorkID)10328349 035 $a(PQKB)10905296 035 $a(DE-He213)978-3-540-79966-5 035 $a(MiAaPQ)EBC4975643 035 $a(MiAaPQ)EBC5579287 035 $a(MiAaPQ)EBC6511643 035 $a(Au-PeEL)EBL4975643 035 $a(CaONFJC)MIL185529 035 $a(OCoLC)1024280516 035 $a(Au-PeEL)EBL5579287 035 $a(OCoLC)1066192987 035 $a(Au-PeEL)EBL6511643 035 $a(OCoLC)1166058624 035 $a(PPN)127049509 035 $a(EXLCZ)991000000000440628 100 $a20211008d2008 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aInformation security theory and practices, smart devices, convergence and next generation networks $esecond IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 : proceedings /$fJose A. Onieva [and three others] (eds.) 205 $a1st ed. 2008. 210 1$aBerlin, Germany ;$aNew York, New York :$cSpringer,$d[2008] 210 4$dİ2008 215 $a1 online resource (XII, 151 p.) 225 1 $aSecurity and Cryptology ;$v5019 300 $aIncludes index. 311 $a3-540-79965-6 327 $aSmart Devices -- Untraceability of RFID Protocols -- A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices -- Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information -- Network Security -- Probabilistic Identification for Hard to Classify Protocol -- A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup -- Availability for DHT-Based Overlay Networks with Unidirectional Routing -- Convergence -- Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures -- Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs) -- Cryptography -- Algebra for Capability Based Attack Correlation -- On the BRIP Algorithms Security for RSA. 330 $aThis volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008. The 10 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book; they examine the rapid development of information technologies and the transition to next generation networks. The papers focus on the security of these complex and resource-constrained systems and are organized in topical sections on smart devices, network security, convergence, and cryptography. 410 0$aSecurity and Cryptology ;$v5019 606 $aSmart cards$vCongresses 606 $aComputer systems$xAccess control$vCongresses 606 $aData protection$vCongresses 615 0$aSmart cards 615 0$aComputer systems$xAccess control 615 0$aData protection 676 $a005.8 702 $aOnieva$b Jose A. 712 02$aIFIP WG 11.2. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465320003316 996 $aInformation Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks$9774444 997 $aUNISA