Table of Contents
|
Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication Claudio Ardagna, Jianying Zhou (Eds.)
|
Front Matter |
Keynote Speech
|
Can code polymorphism limit information leakage? Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall |
1-21 |
Mobile Authentication and Access Control
|
Mobile Electronic Identity: Securing Payment on Mobile Phones Chen Bangdao, A. Roscoe |
22-37 |
Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems Antonios Gouglidis, Ioannis Mavridis |
38-53 |
Lightweight Authentication
|
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen, Chris Mitchell, Shaohua Tang |
54-68 |
An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control Paolo D’arco |
69-84 |
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption Mark Manulis, Bertram Poettering |
85-99 |
Algorithms
|
Formal Framework for the Evaluation of Waveform Resynchronization Algorithms Sylvain Guilley, Karim Khalfallah, Victor Lomne, Jean-Luc Danger |
100-115 |
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda |
116-127 |
Information Leakage Discovery Techniques to Enhance Secure Chip Design Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia |
128-143 |
Hardware Implementation
|
A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer |
144-159 |
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page |
160-174 |
A Comparison of Post-Processing Techniques for Biased Random Number Generators Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik-How Tan |
175-190 |
Security and Cryptography
|
AES Variants Secure against Related-Key Differential and Boomerang Attacks Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann |
191-207 |
Leakage Squeezing Countermeasure against High-Order Attacks Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger |
208-223 |
Security Attacks and Measures (Short Papers)
|
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali |
224-233 |
Entropy of Selectively Encrypted Strings Reine Lundin, Stefan Lindskog |
234-243 |
Practical Attacks on HB and HB+ Protocols Zbigniew Gołębiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada |
244-253 |
Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard Mohammad Habibi, Mahdi Alagheband, Mohammad Aref |
254-263 |
Security Attacks
|
A SMS-Based Mobile Botnet Using Flooding Algorithm Jingyu Hua, Kouichi Sakurai |
264-279 |
FIRE: fault injection for reverse engineering Manuel San Pedro, Mate Soos, Sylvain Guilley |
280-293 |
Hardware Trojan Side-Channels Based on Physical Unclonable Functions Zheng Gong, Marc Makkes |
294-303 |
Security and Trust
|
Formal Analysis of Security Metrics and Risk Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin |
304-319 |
STORM - Collaborative Security Management Environment Theodoros Ntouskas, George Pentafronimos, Spyros Papastergiou |
320-335 |
Trust Agreement in Wireless Mesh Networks Andreas Noack |
336-350 |
Mobile Application Security and Privacy (Short Papers)
|
Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network Kun Peng |
351-360 |
Privacy Respecting Targeted Advertising for Social Networks Christian Kahl, Stephen Crane, Markus Tschersich, Kai Rannenberg |
361-370 |
Privacy Protection for Smartphones: An Ontology-Based Firewall Johann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger |
371-380 |
A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area Savvas Mousionis, Alex Vakaloudis, Constantinos Hilas |
381-389 |