IFIP TC6 Open Digital Library

5. WISTP 2011: Heraklion, Crete, Greece

Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings

Claudio Agostino Ardagna, Jianying Zhou

Springer, Lecture Notes in Computer Science 6633, ISBN: 978-3-642-21039-6


Keynote Speech

Can Code Polymorphism Limit Information Leakage?

Antoine Amarilli, Sascha Müller, David Naccache, Dan Page, Pablo Rauzy, Michael Tunstall


Mobile Authentication and Access Control

Mobile Electronic Identity: Securing Payment on Mobile Phones.

Chen Bangdao, A. W. Roscoe


Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems.

Antonios Gouglidis, Ioannis Mavridis


Lightweight Authentication

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key.

Chunhua Chen 0002, Chris J. Mitchell, Shaohua Tang


An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control.

Paolo D'Arco


Affiliation-Hiding Authentication with Minimal Bandwidth Consumption.

Mark Manulis, Bertram Poettering



Formal Framework for the Evaluation of Waveform Resynchronization Algorithms.

Sylvain Guilley, Karim Khalfallah, Victor Lomné, Jean-Luc Danger


Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library.

Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda


Information Leakage Discovery Techniques to Enhance Secure Chip Design.

Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia


Hardware Implementation

A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines.

Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer


An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture.

Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page


A Comparison of Post-Processing Techniques for Biased Random Number Generators.

Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik How Tan


Security and Cryptography

AES Variants Secure against Related-Key Differential and Boomerang Attacks.

Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann


Leakage Squeezing Countermeasure against High-Order Attacks.

Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger


Security Attacks and Measures (Short Papers)

Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault.

Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali


Entropy of Selectively Encrypted Strings.

Reine Lundin, Stefan Lindskog


Practical Attacks on HB and HB+ Protocols.

Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada


Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard.

Mohammad Hassan Habibi, Mahdi R. Alaghband, Mohammad Reza Aref


Security Attacks

A SMS-Based Mobile Botnet Using Flooding Algorithm.

Jingyu Hua, Kouichi Sakurai


FIRE: Fault Injection for Reverse Engineering.

Manuel San Pedro, Mate Soos, Sylvain Guilley


Hardware Trojan Side-Channels Based on Physical Unclonable Functions.

Zheng Gong, Marc X. Makkes


Security and Trust

Formal Analysis of Security Metrics and Risk.

Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin


STORM - Collaborative Security Management Environment.

Theodoros Ntouskas, Giorgos Pentafronimos, Spyridon Papastergiou


Trust Agreement in Wireless Mesh Networks.

Andreas Noack


Mobile Application Security and Privacy (Short Papers)

Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network.

Kun Peng


Privacy Respecting Targeted Advertising for Social Networks.

Christian Kahl, Stephen Crane, Markus Tschersich, Kai Rannenberg


Privacy Protection for Smartphones: An Ontology-Based Firewall.

Johann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger


A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area.

Savvas Mousionis, Alex Vakaloudis, Constantinos S. Hilas