default search action
5. WISTP 2011: Heraklion, Crete, Greece
- Claudio A. Ardagna, Jianying Zhou:
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. Lecture Notes in Computer Science 6633, Springer 2011, ISBN 978-3-642-21039-6
Keynote Speech
- Antoine Amarilli, Sascha Müller, David Naccache, Dan Page, Pablo Rauzy, Michael Tunstall:
Can Code Polymorphism Limit Information Leakage? 1-21
Mobile Authentication and Access Control
- Chen Bangdao, A. W. Roscoe:
Mobile Electronic Identity: Securing Payment on Mobile Phones. 22-37 - Antonios Gouglidis, Ioannis Mavridis:
Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems. 38-53
Lightweight Authentication
- Chunhua Chen, Chris J. Mitchell, Shaohua Tang:
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key. 54-68 - Paolo D'Arco:
An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control. 69-84 - Mark Manulis, Bertram Poettering:
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. 85-99
Algorithms
- Sylvain Guilley, Karim Khalfallah, Victor Lomné, Jean-Luc Danger:
Formal Framework for the Evaluation of Waveform Resynchronization Algorithms. 100-115 - Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda:
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library. 116-127 - Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia:
Information Leakage Discovery Techniques to Enhance Secure Chip Design. 128-143
Hardware Implementation
- Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer:
A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines. 144-159 - Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page:
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture. 160-174 - Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik How Tan:
A Comparison of Post-Processing Techniques for Biased Random Number Generators. 175-190
Security and Cryptography
- Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann:
AES Variants Secure against Related-Key Differential and Boomerang Attacks. 191-207 - Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger:
Leakage Squeezing Countermeasure against High-Order Attacks. 208-223
Security Attacks and Measures (Short Papers)
- Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali:
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault. 224-233 - Reine Lundin, Stefan Lindskog:
Entropy of Selectively Encrypted Strings. 234-243 - Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada:
Practical Attacks on HB and HB+ Protocols. 244-253 - Mohammad Hassan Habibi, Mahdi R. Alaghband, Mohammad Reza Aref:
Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard. 254-263
Security Attacks
- Jingyu Hua, Kouichi Sakurai:
A SMS-Based Mobile Botnet Using Flooding Algorithm. 264-279 - Manuel San Pedro, Mate Soos, Sylvain Guilley:
FIRE: Fault Injection for Reverse Engineering. 280-293 - Zheng Gong, Marc X. Makkes:
Hardware Trojan Side-Channels Based on Physical Unclonable Functions. 294-303
Security and Trust
- Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin:
Formal Analysis of Security Metrics and Risk. 304-319 - Theodoros Ntouskas, Giorgos Pentafronimos, Spyridon Papastergiou:
STORM - Collaborative Security Management Environment. 320-335 - Andreas Noack:
Trust Agreement in Wireless Mesh Networks. 336-350
Mobile Application Security and Privacy (Short Papers)
- Kun Peng:
Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network. 351-360 - Christian Kahl, Stephen Crane, Markus Tschersich, Kai Rannenberg:
Privacy Respecting Targeted Advertising for Social Networks. 361-370 - Johann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger:
Privacy Protection for Smartphones: An Ontology-Based Firewall. 371-380 - Savvas Mousionis, Alex Vakaloudis, Constantinos S. Hilas:
A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area. 381-389
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.