Search - Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication Access content directly

Filter your results

26 results
Contributor/author Internal identifier : 200187
Image document

Affiliation-Hiding Authentication with Minimal Bandwidth Consumption

Mark Manulis , Bertram Poettering
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.85-99, ⟨10.1007/978-3-642-21040-2_6⟩
Conference papers hal-01573294v1
Image document

A SMS-Based Mobile Botnet Using Flooding Algorithm

Jingyu Hua , Kouichi Sakurai
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.264-279, ⟨10.1007/978-3-642-21040-2_19⟩
Conference papers hal-01573306v1
Image document

A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines

Michael Hutter , Martin Feldhofer , Johannes Wolkerstorfer
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.144-159, ⟨10.1007/978-3-642-21040-2_10⟩
Conference papers hal-01573313v1
Image document

Formal Framework for the Evaluation of Waveform Resynchronization Algorithms

Sylvain Guilley , Karim Khalfallah , Victor Lomne , Jean-Luc Danger
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.100-115, ⟨10.1007/978-3-642-21040-2_7⟩
Conference papers hal-01573296v1
Image document

Entropy of Selectively Encrypted Strings

Reine Lundin , Stefan Lindskog
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.234-243, ⟨10.1007/978-3-642-21040-2_16⟩
Conference papers hal-01573290v1
Image document

Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library

Yumi Sakemi , Tetsuya Izu , Masahiko Takenaka , Masaya Yasuda
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.116-127, ⟨10.1007/978-3-642-21040-2_8⟩
Conference papers hal-01573301v1
Image document

A Comparison of Post-Processing Techniques for Biased Random Number Generators

Siew-Hwee Kwok , Yen-Ling Ee , Guanhan Chew , Kanghong Zheng , Khoongming Khoo , et al.
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.175-190, ⟨10.1007/978-3-642-21040-2_12⟩
Conference papers hal-01573305v1
Image document

AES Variants Secure against Related-Key Differential and Boomerang Attacks

Jiali Choy , Aileen Zhang , Khoongming Khoo , Matt Henricksen , Axel Poschmann
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.191-207, ⟨10.1007/978-3-642-21040-2_13⟩
Conference papers hal-01573307v1
Image document

Formal Analysis of Security Metrics and Risk

Leanid Krautsevich , Fabio Martinelli , Artsiom Yautsiukhin
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.304-319, ⟨10.1007/978-3-642-21040-2_22⟩
Conference papers hal-01573302v1
Image document

Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems

Antonios Gouglidis , Ioannis Mavridis
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.38-53, ⟨10.1007/978-3-642-21040-2_3⟩
Conference papers hal-01573308v1
Image document

Hardware Trojan Side-Channels Based on Physical Unclonable Functions

Zheng Gong , Marc X. Makkes
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.294-303, ⟨10.1007/978-3-642-21040-2_21⟩
Conference papers hal-01573309v1
Image document

A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area

Savvas Mousionis , Alex Vakaloudis , Constantinos Hilas
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.381-389, ⟨10.1007/978-3-642-21040-2_28⟩
Conference papers hal-01573314v1
Image document

Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault

Michael Tunstall , Debdeep Mukhopadhyay , Subidh Ali
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.224-233, ⟨10.1007/978-3-642-21040-2_15⟩
Conference papers hal-01573310v1
Image document

Trust Agreement in Wireless Mesh Networks

Andreas Noack
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.336-350, ⟨10.1007/978-3-642-21040-2_24⟩
Conference papers hal-01573304v1
Image document

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key

Chunhua Chen , Chris J. Mitchell , Shaohua Tang
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.54-68, ⟨10.1007/978-3-642-21040-2_4⟩
Conference papers hal-01573291v1
Image document

Information Leakage Discovery Techniques to Enhance Secure Chip Design

Alessandro Barenghi , Gerardo Pelosi , Yannick Teglia
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.128-143, ⟨10.1007/978-3-642-21040-2_9⟩
Conference papers hal-01573297v1
Image document

Mobile Electronic Identity: Securing Payment on Mobile Phones

Chen Bangdao , A. W. Roscoe
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.22-37, ⟨10.1007/978-3-642-21040-2_2⟩
Conference papers hal-01573293v1
Image document

Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard

Mohammad Hassan Habibi , Mahdi R. Alagheband , Mohammad Reza Aref
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.254-263, ⟨10.1007/978-3-642-21040-2_18⟩
Conference papers hal-01573311v1
Image document

Practical Attacks on HB and HB+ Protocols

Zbigniew Gołębiewski , Krzysztof Majcher , Filip Zagórski , Marcin Zawada
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.244-253, ⟨10.1007/978-3-642-21040-2_17⟩
Conference papers hal-01573292v1
Image document

Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network

Kun Peng
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.351-360, ⟨10.1007/978-3-642-21040-2_25⟩
Conference papers hal-01573300v1
Image document

STORM - Collaborative Security Management Environment

Theodoros Ntouskas , George Pentafronimos , Spyros Papastergiou
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.320-335, ⟨10.1007/978-3-642-21040-2_23⟩
Conference papers hal-01573312v1
Image document

An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control

Paolo D’arco
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.69-84, ⟨10.1007/978-3-642-21040-2_5⟩
Conference papers hal-01573298v1
Image document

An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture

Simon Hoerder , Marcin Wójcik , Stefan Tillich , Daniel Page
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.160-174, ⟨10.1007/978-3-642-21040-2_11⟩
Conference papers hal-01573303v1

Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication

Claudio A. Ardagna , Jianying Zhou
Springer, LNCS-6633, 2011, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-21040-2⟩
Books hal-01573289v1
Image document

Privacy Respecting Targeted Advertising for Social Networks

Christian Kahl , Stephen Crane , Markus Tschersich , Kai Rannenberg
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.361-370, ⟨10.1007/978-3-642-21040-2_26⟩
Conference papers hal-01573299v1
Image document

Leakage Squeezing Countermeasure against High-Order Attacks

Houssem Maghrebi , Sylvain Guilley , Jean-Luc Danger
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.208-223, ⟨10.1007/978-3-642-21040-2_14⟩
Conference papers hal-01573295v1