Information Security Theory and Practice. Securing the Internet of Things: 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings

Author:   David Naccache ,  Damien Sauveron
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2014 ed.
Volume:   8501
ISBN:  

9783662438251


Pages:   201
Publication Date:   11 July 2014
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $142.29 Quantity:  
Add to Cart

Share |

Information Security Theory and Practice. Securing the Internet of Things: 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings


Add your own review!

Overview

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy.

Full Product Details

Author:   David Naccache ,  Damien Sauveron
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2014 ed.
Volume:   8501
Dimensions:   Width: 15.50cm , Height: 1.20cm , Length: 23.50cm
Weight:   3.401kg
ISBN:  

9783662438251


ISBN 10:   3662438259
Pages:   201
Publication Date:   11 July 2014
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Sweet Dreams and Nightmares: Security in the Internet of Things.- A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations.- Towards More Practical Time-Driven Cache Attacks.- Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Built in Protection against Side-Channel and Fault Attacks.- New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards.- A Pre-processing Composition for Secret Key Recovery on Android Smartphone.- Usable Privacy for Mobile Sensing Applications.- A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.- End-to-End Secure and Privacy Preserving Mobile Chat Application.- S-box, SET, Match: A Toolbox for S-box Analysis.- Policy-Based Access Control for Body Sensor Networks.- Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider.- CAN Bus Risk Analysis Revisit.- AU2EU: Privacy-Preserving Matching of DNA Sequences.- Early DDoS Detection Based on Data Mining Techniques.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List