WISTP C

31 papers

YearTitle / Authors
2010A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones.
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick Schmidt
2010A Smart Card Implementation of the McEliece PKC.
Falko Strenzke
2010A Very Compact Hardware Implementation of the KASUMI Block Cipher.
Dai Yamamoto, Kouichi Itoh, Jun Yajima
2010An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks.
Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater
2010Attribute-Based Encryption with Break-Glass.
Achim D. Brucker, Helmut Petritsch, Stefan G. Weber
2010Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?
Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci
2010Design and Analysis of a Generalized Canvas Protocol.
Marián Novotný
2010Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines.
Alexandre Venelli
2010Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures.
Michael Braun, Ulrike Meyer, Susanne Wetzel
2010Efficient and Effective Buffer Overflow Protection on ARM Processors.
Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens
2010Evaluation Metrics of Physical Non-invasive Security.
Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan
2010Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios.
Giovanni Russello, Enrico Scalavino
2010Fraud Detection for Voice over IP Services on Next-Generation Networks.
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo García Bringas
2010Generic Constructions of Biometric Identity Based Encryption Systems.
Neyire Deniz Sarier
2010Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions.
Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner
2010Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML.
Sergio Sánchez García, Ana Gómez Oliva
2010Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings
Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron
2010MoteAODV - An AODV Implementation for TinyOS 2.0.
Werner Backes, Jared Cordasco
2010Novel FPGA-Based Signature Matching for Deep Packet Inspection.
Nitesh B. Guinde, Sotirios G. Ziavras
2010On the Security of a Two-Factor Authentication Scheme.
Luigi Catuogno, Clemente Galdi
2010Practical Schemes for Privacy and Security Enhanced RFID.
Jaap-Henk Hoepman, Rieks Joosten
2010Predicting and Preventing Insider Threat in Relational Database Systems.
Qussai Yaseen, Brajendra Panda
2010Proxy Smart Card Systems.
Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti
2010Random Number Generation Based on Fingerprints.
Shkodran Gerguri, Václav Matyás Jr., Zdenek Ríha, Ludek Smolík
2010Secure and Usable Out-Of-Band Channels for
Ronald Kainda, Ivan Flechais, A. W. Roscoe
2010Security Analysis of Mobile Phones Used as OTP Generators.
Håvard Raddum, Lars Hopland Nestås, Kjell Jørgen Hole
2010The Design of Secure and Efficient P2PSIP Communication Systems.
Xianghan Zheng, Vladimir A. Oleshchuk
2010The Market Failure of Anonymity Services.
Heiko Rossnagel
2010Towards Electrical, Integrated Implementations of SIMPL Systems.
Ulrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, György Csaba
2010Trust in Peer-to-Peer Content Distribution Protocols.
Nicolai Kuntze, Carsten Rudolph, Andreas Fuchs
2010Website Credential Storage and Two-Factor Web Authentication with a Java SIM.
Jonathan Hart, Konstantinos Markantonakis, Keith Mayes