Full Text Documents

Search


Table of Contents
Information Security: Theory and Practice. Security of Mobile and Cyber-Physical Systems
Lorenzo Cavallaro, Dieter Gollmann (Eds.)
Front Matter

Cryptography and Cryptanalysis


Multiplicative Homomorphic E-Auction with Formally Provable Security
Kun Peng, Matt Henricksen
1-17
Malleable Signatures for Resource Constrained Platforms
Henrich Pöhls, Stefan Peters, Kai Samelin, Joachim Posegga, Hermann Meer
18-33
Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks
Panagiotis Ilia, George Oikonomou, Theo Tryfonas
34-49

Mobile Security


URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security
Daniel Schreckling, Stephan Huber, Focke Höhne, Joachim Posegga
50-65
Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphone
Max Günther, Bernd Borchert
66-81

Smart Cards and Embedded Devices


A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards
Michael Lackner, Reinhard Berlach, Wolfgang Raschke, Reinhold Weiss, Christian Steger
82-97
A Forward Privacy Model for RFID Authentication Protocols
Daisuke Moriyama, Miyako Ohkubo, Shin’ichiro Matsuo
98-111
On Secure Embedded Token Design
Simon Hoerder, Kimmo Järvinen, Daniel Page
112-128
Lightweight Authentication Protocol for Low-Cost RFID Tags
Pierre Dusart, Sinaly Traoré
129-144

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/