index - Information Security Theory and Practice: Security of Mobile and Cyber-Physical Systems Access content directly

Full Text Documents

Chargement de la page


Chargement de la page

Table of Contents
Information Security: Theory and Practice. Security of Mobile and Cyber-Physical Systems
Lorenzo Cavallaro, Dieter Gollmann (Eds.)
Front Matter

Cryptography and Cryptanalysis

Multiplicative Homomorphic E-Auction with Formally Provable Security
Kun Peng, Matt Henricksen
Malleable Signatures for Resource Constrained Platforms
Henrich Pöhls, Stefan Peters, Kai Samelin, Joachim Posegga, Hermann Meer
Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks
Panagiotis Ilia, George Oikonomou, Theo Tryfonas

Mobile Security

URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security
Daniel Schreckling, Stephan Huber, Focke Höhne, Joachim Posegga
Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphone
Max Günther, Bernd Borchert

Smart Cards and Embedded Devices

A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards
Michael Lackner, Reinhard Berlach, Wolfgang Raschke, Reinhold Weiss, Christian Steger
A Forward Privacy Model for RFID Authentication Protocols
Daisuke Moriyama, Miyako Ohkubo, Shin’ichiro Matsuo
On Secure Embedded Token Design
Simon Hoerder, Kimmo Järvinen, Daniel Page
Lightweight Authentication Protocol for Low-Cost RFID Tags
Pierre Dusart, Sinaly Traoré



Designed by Inria-IES Team :    Hosted by HAL :