Full Text Documents

Search


Table of Contents
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices
Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron
Front Matter

Embedded Security


Efficient and Effective Buffer Overflow Protection on ARM Processors
Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens
1-16
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines
Alexandre Venelli
17-30
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick Schmidt
31-46
A Smart Card Implementation of the McEliece PKC
Falko Strenzke
47-59
Evaluation Metrics of Physical Non-invasive Security
Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan
60-75

Protocols


Trust in Peer-to-Peer Content Distribution Protocols
Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs
76-89
Generic Constructions of Biometric Identity Based Encryption Systems
Neyire Deniz Sarier
90-105
Design and Analysis of a Generalized Canvas Protocol
Marián Novotný
106-121

Highly Constrained Embedded Systems


Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Michael Braun, Ulrike Meyer, Susanne Wetzel
122-137
Practical Schemes for Privacy and Security Enhanced RFID
Jaap-Henk Hoepman, Rieks Joosten
138-153
MoteAODV - An AODV Implementation for TinyOS 2.0
Werner Backes, Jared Cordasco
154-169

Security


Random Number Generation Based on Fingerprints
Shkodran Gerguri, Václav Matyáš, Zdeněk Říha, Luděk Smolík
170-182
Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML
Sergio Sánchez García, Ana Gómez Oliva
183-198
Fraud Detection for Voice over IP Services on Next-Generation Networks
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia Bringas
199-212

Smart Card Security


Proxy Smart Card Systems
Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti
213-220
Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?
Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci
221-228
Website Credential Storage and Two-Factor Web Authentication with a Java SIM
Jonathan Hart, Konstantinos Markantonakis, Keith Mayes
229-236

Algorithms


Attribute-Based Encryption with Break-Glass
Achim D. Brucker, Helmut Petritsch, Stefan G. Weber
237-244
On the Security of a Two-Factor Authentication Scheme
Luigi Catuogno, Clemente Galdi
245-252
The Design of Secure and Efficient P2PSIP Communication Systems
Xianghan Zheng, Vladimir Oleshchuk
253-260

Hardware Implementations


Novel FPGA-Based Signature Matching for Deep Packet Inspection
Nitesh B. Guinde, Sotirios G. Ziavras
261-276
Towards Electrical, Integrated Implementations of SIMPL Systems
Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, György Csaba
277-292
A Very Compact Hardware Implementation of the KASUMI Block Cipher
Dai Yamamoto, Kouichi Itoh, Jun Yajima
293-307

Embedded Systems


Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Ronald Kainda, Ivan Flechais, A. W. Roscoe
308-315
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions
Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner
316-323
Security Analysis of Mobile Phones Used as OTP Generators
Håvard Raddum, Lars Hopland Nestås, Kjell Jørgen Hole
324-331
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks
Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater
332-339

Anonymity/Database Security


The Market Failure of Anonymity Services
Heiko Rossnagel
340-354
Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios
Giovanni Russello, Enrico Scalavino
355-367
Predicting and Preventing Insider Threat in Relational Database Systems
Qussai Yaseen, Brajendra Panda
368-383