Vai al contenuto principale della pagina

Information security theory and practices : security and privacy of pervasive systems and smart devices : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010 : proceedings / / Pierangela Samarati ... [et al.], (eds.)



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Information security theory and practices : security and privacy of pervasive systems and smart devices : 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010 : proceedings / / Pierangela Samarati ... [et al.], (eds.) Visualizza cluster
Pubblicazione: New York, : Springer, 2010
Edizione: 1st ed.
Descrizione fisica: 1 online resource (XIII, 386 p. 93 illus.)
Disciplina: 005.8
Soggetto topico: Data protection
Computer systems - Access control
Smart cards
Mobile computing - Security measures
Classificazione: DAT 179f
DAT 260f
DAT 460f
DAT 465f
SS 4800
Altri autori: SamaratiPierangela  
Note generali: Bibliographic Level Mode of Issuance: Monograph
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Embedded Security -- Efficient and Effective Buffer Overflow Protection on ARM Processors -- Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines -- A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones -- A Smart Card Implementation of the McEliece PKC -- Evaluation Metrics of Physical Non-invasive Security -- Protocols -- Trust in Peer-to-Peer Content Distribution Protocols -- Generic Constructions of Biometric Identity Based Encryption Systems -- Design and Analysis of a Generalized Canvas Protocol -- Highly Constrained Embedded Systems -- Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures -- Practical Schemes for Privacy and Security Enhanced RFID -- MoteAODV – An AODV Implementation for TinyOS 2.0 -- Security -- Random Number Generation Based on Fingerprints -- Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML -- Fraud Detection for Voice over IP Services on Next-Generation Networks -- Smart Card Security -- Proxy Smart Card Systems -- Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract? -- Website Credential Storage and Two-Factor Web Authentication with a Java SIM -- Algorithms -- Attribute-Based Encryption with Break-Glass -- On the Security of a Two-Factor Authentication Scheme -- The Design of Secure and Efficient P2PSIP Communication Systems -- Hardware Implementations -- Novel FPGA-Based Signature Matching for Deep Packet Inspection -- Towards Electrical, Integrated Implementations of SIMPL Systems -- A Very Compact Hardware Implementation of the KASUMI Block Cipher -- Embedded Systems -- Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions -- Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions -- Security Analysis of Mobile Phones Used as OTP Generators -- An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks -- Anonymity/Database Security -- The Market Failure of Anonymity Services -- Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios -- Predicting and Preventing Insider Threat in Relational Database Systems.
Titolo autorizzato: Information security theory and practices  Visualizza cluster
ISBN: 1-280-38621-5
9786613564139
3-642-12368-6
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910483105903321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilitĂ  qui
Serie: Lecture notes in computer science ; ; 6033. LNCS sublibrary. : SL 4, . -Security and cryptology.