IFIP TC6 Open Digital Library

4. WISTP 2010: Passau, Germany

Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings

Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron

Springer, Lecture Notes in Computer Science 6033, ISBN: 978-3-642-12367-2



Contents

Embedded Security

Efficient and Effective Buffer Overflow Protection on ARM Processors.

Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens

 1-16

Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines.

Alexandre Venelli

 17-30

A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones.

Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick Schmidt

 31-46

A Smart Card Implementation of the McEliece PKC.

Falko Strenzke

 47-59

Evaluation Metrics of Physical Non-invasive Security.

Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan

 60-75

Protocols

Trust in Peer-to-Peer Content Distribution Protocols.

Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs

 76-89

Generic Constructions of Biometric Identity Based Encryption Systems.

Neyire Deniz Sarier

 90-105

Design and Analysis of a Generalized Canvas Protocol.

Marián Novotný

 106-121

Highly Constrained Embedded Systems

Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.

Michael Braun, Ulrike Meyer, Susanne Wetzel

 122-137

Practical Schemes for Privacy and Security Enhanced RFID.

Jaap-Henk Hoepman, Rieks Joosten

 138-153

MoteAODV - An AODV Implementation for TinyOS 2.0.

Werner Backes, Jared Cordasco

 154-169

Security

Random Number Generation Based on Fingerprints.

Shkodran Gerguri, Václav Matyás Jr., Zdenek Ríha, Ludek Smolík

 170-182

Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML.

Sergio Sánchez García, Ana Gómez Oliva

 183-198

Fraud Detection for Voice over IP Services on Next-Generation Networks.

Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia Bringas

 199-212

Smart Card Security

Proxy Smart Card Systems.

Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti

 213-220

Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?

Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci

 221-228

Website Credential Storage and Two-Factor Web Authentication with a Java SIM.

Jonathan Hart, Konstantinos Markantonakis, Keith Mayes

 229-236

Algorithms

Attribute-Based Encryption with Break-Glass.

Achim D. Brucker, Helmut Petritsch, Stefan G. Weber

 237-244

On the Security of a Two-Factor Authentication Scheme.

Luigi Catuogno, Clemente Galdi

 245-252

The Design of Secure and Efficient P2PSIP Communication Systems.

Xianghan Zheng, Vladimir A. Oleshchuk

 253-260

Hardware Implementations

Novel FPGA-Based Signature Matching for Deep Packet Inspection.

Nitesh B. Guinde, Sotirios G. Ziavras

 261-276

Towards Electrical, Integrated Implementations of SIMPL Systems.

Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, György Csaba

 277-292

A Very Compact Hardware Implementation of the KASUMI Block Cipher.

Dai Yamamoto, Kouichi Itoh, Jun Yajima

 293-307

Embedded Systems

Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions.

Ronald Kainda, Ivan Flechais, A. W. Roscoe

 308-315

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions.

Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner

 316-323

Security Analysis of Mobile Phones Used as OTP Generators.

Håvard Raddum, Lars Hopland Nestås, Kjell Jørgen Hole

 324-331

An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks.

Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater

 332-339

Anonymity/Database Security

The Market Failure of Anonymity Services.

Heiko Rossnagel

 340-354

Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios.

Giovanni Russello, Enrico Scalavino

 355-367

Predicting and Preventing Insider Threat in Relational Database Systems.

Qussai Yaseen, Brajendra Panda

 368-383