5. WISTP 2011: Heraklion, Crete, Greece
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings
Claudio Agostino Ardagna, Jianying Zhou
Springer, Lecture Notes in Computer Science 6633, ISBN: 978-3-642-21039-6
Contents
Keynote Speech
Can Code Polymorphism Limit Information Leakage?
Antoine Amarilli, Sascha Müller, David Naccache, Dan Page, Pablo Rauzy, Michael Tunstall
1-21
Mobile Authentication and Access Control
Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems.
Antonios Gouglidis, Ioannis Mavridis
38-53
Lightweight Authentication
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key.
Chunhua Chen 0002, Chris J. Mitchell, Shaohua Tang
54-68
An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control.
Paolo D'Arco
69-84
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption.
Mark Manulis, Bertram Poettering
85-99
Algorithms
Formal Framework for the Evaluation of Waveform Resynchronization Algorithms.
Sylvain Guilley, Karim Khalfallah, Victor Lomné, Jean-Luc Danger
100-115
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library.
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
116-127
Information Leakage Discovery Techniques to Enhance Secure Chip Design.
Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia
128-143
Hardware Implementation
A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines.
Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer
144-159
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture.
Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page
160-174
A Comparison of Post-Processing Techniques for Biased Random Number Generators.
Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik How Tan
175-190
Security and Cryptography
AES Variants Secure against Related-Key Differential and Boomerang Attacks.
Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann
191-207
Leakage Squeezing Countermeasure against High-Order Attacks.
Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger
208-223
Security Attacks and Measures (Short Papers)
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault.
Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali
224-233
Practical Attacks on HB and HB+ Protocols.
Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada
244-253
Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard.
Mohammad Hassan Habibi, Mahdi R. Alaghband, Mohammad Reza Aref
254-263
Security Attacks
Hardware Trojan Side-Channels Based on Physical Unclonable Functions.
Zheng Gong, Marc X. Makkes
294-303
Security and Trust
Formal Analysis of Security Metrics and Risk.
Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin
304-319
STORM - Collaborative Security Management Environment.
Theodoros Ntouskas, Giorgos Pentafronimos, Spyridon Papastergiou
320-335
Mobile Application Security and Privacy (Short Papers)
Privacy Respecting Targeted Advertising for Social Networks.
Christian Kahl, Stephen Crane, Markus Tschersich, Kai Rannenberg
361-370
Privacy Protection for Smartphones: An Ontology-Based Firewall.
Johann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger
371-380
Savvas Mousionis, Alex Vakaloudis, Constantinos S. Hilas
381-389