Identity management for internet of things / / Parikshit N. Mahalle, Poonam N. Railkar |
Autore | Mahalle Parikshit N. |
Pubbl/distr/stampa | Aalborg, Denmark : , : River Publishers, , 2015 |
Descrizione fisica | 1 online resource (185 pages) : illustrations (some color), charts, tables |
Disciplina | 004.678 |
Collana | River Publishers Series in Communications |
Soggetto topico |
Internet of things
Ubiquitous computing - Security measures Computers - Access control |
Soggetto genere / forma | Electronic books. |
ISBN | 87-93102-91-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910465768603321 |
Mahalle Parikshit N. | ||
Aalborg, Denmark : , : River Publishers, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information security theory and practice : smart devices, pervasive systems, and ubiquitous networks : third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009 : proceedings / / Olivier Markowitch ... [et al.] (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2009 |
Descrizione fisica | 1 online resource (XII, 167 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | MarkowitchOlivier |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Data protection
Computer systems - Access control Smart cards Mobile computing - Security measures Ubiquitous computing - Security measures |
ISBN | 3-642-03944-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Mobility -- On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks -- A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems -- Privacy-Aware Location Database Service for Granular Queries -- Attacks and Secure Implementations -- Algebraic Attacks on RFID Protocols -- Anti-counterfeiting Using Memory Spots -- On Second-Order Fault Analysis Resistance for CRT-RSA Implementations -- Performance and Security -- Measurement Analysis When Benchmarking Java Card Platforms -- Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card -- Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks -- Cryptography -- Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks -- Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure -- PKIX Certificate Status in Hybrid MANETs. |
Altri titoli varianti |
WISTP 2009
IFIP WG 11.2 International Workshop, WISTP 2009 |
Record Nr. | UNINA-9910483237203321 |
Berlin ; ; New York, : Springer, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information security theory and practices : smart cards, mobile and ubiquitous computing systems : First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, proceedings / / Damien Sauveron [three others] (editors) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg ; ; New York : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (260 p.) |
Disciplina | 005.8 |
Collana | Lecture notes in computer science |
Soggetto topico |
Data protection
Computer systems - Access control Smart cards Mobile computing - Security measures Ubiquitous computing - Security measures |
ISBN | 3-540-72354-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Mobility -- A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks -- A New Resilient Key Management Protocol for Wireless Sensor Networks -- Hardware and Cryptography I -- Efficient Use of Random Delays in Embedded Software -- Enhanced Doubling Attacks on Signed-All-Bits Set Recoding -- Privacy -- Securing the Distribution and Storage of Secrets with Trusted Platform Modules -- Distributed Certified Information Access for Mobile Devices -- Cryptography Scheme -- Linkability of Some Blind Signature Schemes -- Optimistic Non-repudiation Protocol Analysis -- Secure Remote User Authentication Scheme Using Bilinear Pairings -- Cryptanalysis of Some Proxy Signature Schemes Without Certificates -- Smart Card -- Performance Evaluation of Java Card Bytecodes -- Reverse Engineering Java Card Applets Using Power Analysis -- An Embedded System for Practical Security Analysis of Contactless Smartcards -- A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies -- Small Devices -- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication -- An Information Flow Verifier for Small Embedded Systems -- Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks -- Hardware and Cryptography II -- Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures -- CRT RSA Algorithm Protected Against Fault Attacks -- Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks. |
Record Nr. | UNINA-9910483739103321 |
Berlin ; ; Heidelberg ; ; New York : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information security theory and practices : smart cards, mobile and ubiquitous computing systems : First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, proceedings / / Damien Sauveron [three others] (editors) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg ; ; New York : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (260 p.) |
Disciplina | 005.8 |
Collana | Lecture notes in computer science |
Soggetto topico |
Data protection
Computer systems - Access control Smart cards Mobile computing - Security measures Ubiquitous computing - Security measures |
ISBN | 3-540-72354-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Mobility -- A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks -- A New Resilient Key Management Protocol for Wireless Sensor Networks -- Hardware and Cryptography I -- Efficient Use of Random Delays in Embedded Software -- Enhanced Doubling Attacks on Signed-All-Bits Set Recoding -- Privacy -- Securing the Distribution and Storage of Secrets with Trusted Platform Modules -- Distributed Certified Information Access for Mobile Devices -- Cryptography Scheme -- Linkability of Some Blind Signature Schemes -- Optimistic Non-repudiation Protocol Analysis -- Secure Remote User Authentication Scheme Using Bilinear Pairings -- Cryptanalysis of Some Proxy Signature Schemes Without Certificates -- Smart Card -- Performance Evaluation of Java Card Bytecodes -- Reverse Engineering Java Card Applets Using Power Analysis -- An Embedded System for Practical Security Analysis of Contactless Smartcards -- A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies -- Small Devices -- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication -- An Information Flow Verifier for Small Embedded Systems -- Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks -- Hardware and Cryptography II -- Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures -- CRT RSA Algorithm Protected Against Fault Attacks -- Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks. |
Record Nr. | UNISA-996465991403316 |
Berlin ; ; Heidelberg ; ; New York : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Proceedings : Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : SecPerU 2007 : 19 July, 2007, Istanbul, Turkey |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2007 |
Soggetto topico |
Ubiquitous computing - Security measures
Wireless communication systems Engineering & Applied Sciences Computer Science |
ISBN | 1-5090-8749-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996202060503316 |
[Place of publication not identified], : IEEE Computer Society, 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Proceedings : Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : SecPerU 2007 : 19 July, 2007, Istanbul, Turkey |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2007 |
Soggetto topico |
Ubiquitous computing - Security measures
Wireless communication systems Engineering & Applied Sciences Computer Science |
ISBN |
9781509087495
1509087494 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910142655203321 |
[Place of publication not identified], : IEEE Computer Society, 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
SecPerU 2006 : Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2006 |
Disciplina | 005.4 |
Soggetto topico |
Ubiquitous computing - Security measures
Wireless communication systems Engineering & Applied Sciences Computer Science |
ISBN | 1-5090-9476-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996197577803316 |
[Place of publication not identified], : IEEE Computer Society, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
SecPerU 2006 : Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2006 |
Disciplina | 005.4 |
Soggetto topico |
Ubiquitous computing - Security measures
Wireless communication systems Engineering & Applied Sciences Computer Science |
ISBN |
9781509094769
1509094768 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145620503321 |
[Place of publication not identified], : IEEE Computer Society, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|