6. WISTP 2012: Egham, UK
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
Ioannis G. Askoxylakis, Henrich Christopher Pöhls, Joachim Posegga
Springer, Lecture Notes in Computer Science 7322, ISBN: 978-3-642-30954-0
Contents
Keynotes
Recent Developments in Low-Level Software Security.
Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef, Frank Piessens
1-16
Protocols
Another Fallen Hash-Based RFID Authentication Protocol.
Julio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
29-37
Protocols (Short Papers)
HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network.
G. Kirubavathi Venkatesh, R. Anitha Nadarajan
38-48
Privacy
Privacy Preserving Social Network Publication on Bipartite Graphs.
Jian Zhou, Jiwu Jing, Ji Xiang, Lei Wang
58-70
Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications.
Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, Michaela Kauer
71-86
Privacy (Short Paper)
Privacy Preservation of User History Graph.
Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake
87-96
Policy and Access Control
HiPoLDS: A Security Policy Language for Distributed Systems.
Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Oliveira, Yves Roudier
97-112
Multi-Party Computation
Optimal Parameters for Efficient Two-Party Computation Protocols.
Chaya Ganesh, C. Pandu Rangan
128-143
Assisting Server for Secure Multi-Party Computation.
Jens-Matthias Bohli, Wenting Li, Jan Seedorf
144-159
Cryptography (Short Papers)
An Efficient Lattice-Based Secret Sharing Construction.
Rachid El Bansarkhani, Mohammed Meziani
160-168
On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems.
Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, Jean-Luc Danger
169-178
Impossible Differential Cryptanalysis of Reduced-Round LBlock.
Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci
179-188
Mobile Security
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices.
Johann Großschädl, Dan Page, Stefan Tillich
189-207
Daniel Schreckling, Joachim Posegga, Johannes Köstler, Matthias Schaff
208-223