Table of Contents
|
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron |
Front Matter |
Embedded Security
|
Efficient and Effective Buffer Overflow Protection on ARM Processors Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens |
1-16 |
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines Alexandre Venelli |
17-30 |
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick Schmidt |
31-46 |
A Smart Card Implementation of the McEliece PKC Falko Strenzke |
47-59 |
Evaluation Metrics of Physical Non-invasive Security Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan |
60-75 |
Protocols
|
Trust in Peer-to-Peer Content Distribution Protocols Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs |
76-89 |
Generic Constructions of Biometric Identity Based Encryption Systems Neyire Deniz Sarier |
90-105 |
Design and Analysis of a Generalized Canvas Protocol Marián Novotný |
106-121 |
Highly Constrained Embedded Systems
|
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures Michael Braun, Ulrike Meyer, Susanne Wetzel |
122-137 |
Practical Schemes for Privacy and Security Enhanced RFID Jaap-Henk Hoepman, Rieks Joosten |
138-153 |
MoteAODV - An AODV Implementation for TinyOS 2.0 Werner Backes, Jared Cordasco |
154-169 |
Security
|
Random Number Generation Based on Fingerprints Shkodran Gerguri, Václav Matyáš, Zdeněk Říha, Luděk Smolík |
170-182 |
Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML Sergio Sánchez García, Ana Gómez Oliva |
183-198 |
Fraud Detection for Voice over IP Services on Next-Generation Networks Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia Bringas |
199-212 |
Smart Card Security
|
Proxy Smart Card Systems Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti |
213-220 |
Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract? Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci |
221-228 |
Website Credential Storage and Two-Factor Web Authentication with a Java SIM Jonathan Hart, Konstantinos Markantonakis, Keith Mayes |
229-236 |
Algorithms
|
Attribute-Based Encryption with Break-Glass Achim D. Brucker, Helmut Petritsch, Stefan G. Weber |
237-244 |
On the Security of a Two-Factor Authentication Scheme Luigi Catuogno, Clemente Galdi |
245-252 |
The Design of Secure and Efficient P2PSIP Communication Systems Xianghan Zheng, Vladimir Oleshchuk |
253-260 |
Hardware Implementations
|
Novel FPGA-Based Signature Matching for Deep Packet Inspection Nitesh B. Guinde, Sotirios G. Ziavras |
261-276 |
Towards Electrical, Integrated Implementations of SIMPL Systems Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, György Csaba |
277-292 |
A Very Compact Hardware Implementation of the KASUMI Block Cipher Dai Yamamoto, Kouichi Itoh, Jun Yajima |
293-307 |
Embedded Systems
|
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions Ronald Kainda, Ivan Flechais, A. W. Roscoe |
308-315 |
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner |
316-323 |
Security Analysis of Mobile Phones Used as OTP Generators Håvard Raddum, Lars Hopland Nestås, Kjell Jørgen Hole |
324-331 |
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater |
332-339 |
Anonymity/Database Security
|
The Market Failure of Anonymity Services Heiko Rossnagel |
340-354 |
Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios Giovanni Russello, Enrico Scalavino |
355-367 |
Predicting and Preventing Insider Threat in Relational Database Systems Qussai Yaseen, Brajendra Panda |
368-383 |