Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings /

This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers present...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Cavallaro, Lorenzo. (Editor), Gollmann, Dieter. (Editor)
Format: Electronic
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Series:Lecture Notes in Computer Science, 7886
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-38530-8
Table of Contents:
  • Cryptography and Cryptanalysis
  • Multiplicative Homomorphic E-Auction with Formally Provable Security
  • Malleable Signatures for Resource Constrained Platforms
  • Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks
  • Mobile Security
  • URANOS: User-Guided Rewriting for Plugin-Enabled Android ApplicatiOn Security
  • Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphone
  • Smart Cards and Embedded Devices
  • A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards
  • A Forward Privacy Model for RFID Authentication Protocols
  • On Secure Embedded Token Design: Quasi-looped Yao Circuits and Bounded Leakage
  • Lightweight Authentication Protocol for Low-Cost RFID Tags.