My Account Log in

1 option

Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks : Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 / edited by José A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Onieva, Jose A., editor.
Sauveron, Damien, editor.
Chaumette, Serge, editor.
Gollmann, Dieter, editor.
Markantonakis, Konstantinos, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 5019.
Security and Cryptology ; 5019
Language:
English
Subjects (All):
Computer security.
Computer networks.
Data encryption (Computer science).
Management information systems.
Computer science.
Computers and civilization.
Systems and Data Security.
Computer Communication Networks.
Cryptology.
Management of Computing and Information Systems.
Computers and Society.
Local Subjects:
Systems and Data Security.
Computer Communication Networks.
Cryptology.
Management of Computing and Information Systems.
Computers and Society.
Physical Description:
1 online resource (XII, 151 pages).
Edition:
First edition 2008.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
System Details:
text file PDF
Summary:
This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008. The 10 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book; they examine the rapid development of information technologies and the transition to next generation networks. The papers focus on the security of these complex and resource-constrained systems and are organized in topical sections on smart devices, network security, convergence, and cryptography.
Contents:
Smart Devices
Untraceability of RFID Protocols
A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices
Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information
Network Security
Probabilistic Identification for Hard to Classify Protocol
A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup
Availability for DHT-Based Overlay Networks with Unidirectional Routing
Convergence
Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures
Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs)
Cryptography
Algebra for Capability Based Attack Correlation
On the BRIP Algorithms Security for RSA.
Other Format:
Printed edition:
ISBN:
978-3-540-79966-5
9783540799665
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account