Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices
Springer Berlin (Verlag)
978-3-642-12367-2 (ISBN)
Embedded Security.- Efficient and Effective Buffer Overflow Protection on ARM Processors.- Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines.- A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones.- A Smart Card Implementation of the McEliece PKC.- Evaluation Metrics of Physical Non-invasive Security.- Protocols.- Trust in Peer-to-Peer Content Distribution Protocols.- Generic Constructions of Biometric Identity Based Encryption Systems.- Design and Analysis of a Generalized Canvas Protocol.- Highly Constrained Embedded Systems.- Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.- Practical Schemes for Privacy and Security Enhanced RFID.- MoteAODV - An AODV Implementation for TinyOS 2.0.- Security.- Random Number Generation Based on Fingerprints.- Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML.- Fraud Detection for Voice over IP Services on Next-Generation Networks.- Smart Card Security.- Proxy Smart Card Systems.- Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?.- Website Credential Storage and Two-Factor Web Authentication with a Java SIM.- Algorithms.- Attribute-Based Encryption with Break-Glass.- On the Security of a Two-Factor Authentication Scheme.- The Design of Secure and Efficient P2PSIP Communication Systems.- Hardware Implementations.- Novel FPGA-Based Signature Matching for Deep Packet Inspection.- Towards Electrical, Integrated Implementations of SIMPL Systems.- A Very Compact Hardware Implementation of the KASUMI Block Cipher.- Embedded Systems.- Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions.- Identification andVerification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions.- Security Analysis of Mobile Phones Used as OTP Generators.- An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks.- Anonymity/Database Security.- The Market Failure of Anonymity Services.- Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios.- Predicting and Preventing Insider Threat in Relational Database Systems.
| Erscheint lt. Verlag | 9.4.2010 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XIII, 386 p. 93 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Gewicht | 611 g |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Schlagworte | Algorithm analysis and problem complexity • arm processors • authentication • collision attacks • Cryptanalysis • cryptography • FPGA • Information Security • Intrusion Detection • java card • key distribution • mobile and ad hoc network • RFID • RFID (Radio Frequency Identificatio) • SIP • Smart cards • wireless sensor networks |
| ISBN-10 | 3-642-12367-8 / 3642123678 |
| ISBN-13 | 978-3-642-12367-2 / 9783642123672 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich