1. WISTP 2007: Heraklion, Crete, Greece
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings
Damien Sauveron, Constantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater
Springer, Lecture Notes in Computer Science 4462, ISBN: 978-3-540-72353-0
Contents
Mobility
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks.
Eve Atallah, Serge Chaumette
1-13
A New Resilient Key Management Protocol for Wireless Sensor Networks.
Chakib Bekara, Maryline Laurent-Maknavicius
14-26
Hardware and Cryptography I
Enhanced Doubling Attacks on Signed-All-Bits Set Recoding.
HeeSeok Kim, Tae Hyun Kim 0003, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim
39-52
Privacy
Securing the Distribution and Storage of Secrets with Trusted Platform Modules.
Paul E. Sevinç, Mario Strasser, David A. Basin
53-66
Distributed Certified Information Access for Mobile Devices.
Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano
67-79
Cryptography Scheme
Secure Remote User Authentication Scheme Using Bilinear Pairings.
Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo
102-114
Cryptanalysis of Some Proxy Signature Schemes Without Certificates.
Wun-She Yap, Swee-Huay Heng, Bok-Min Goi
115-126
Smart Card
Performance Evaluation of Java Card Bytecodes.
Pierre Paradinas, Julien Cordry, Samia Bouzefrane
127-137
Reverse Engineering Java Card Applets Using Power Analysis.
Dennis Vermoen, Marc F. Witteman, Georgi Gaydadjiev
138-149
An Embedded System for Practical Security Analysis of Contactless Smartcards.
Timo Kasper, Dario Carluccio, Christof Paar
150-160
Kevin Eagles, Constantinos Markantonakis, Keith Mayes
161-174
Small Devices
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication.
Walter Bamberger, Oliver Welter, Stephan Spitz
175-188
An Information Flow Verifier for Small Embedded Systems.
Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl
189-201
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks.
Nicolas Fournel, Marine Minier, Stéphane Ubéda
202-214
Hardware and Cryptography II
Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures.
Chong Hee Kim, Jean-Jacques Quisquater
215-228
CRT RSA Algorithm Protected Against Fault Attacks.
Arnaud Boscher, Robert Naciri, Emmanuel Prouff
229-243
Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.
Frank Vater, Steffen Peter, Peter Langendörfer
244-253