4. WISTP 2010: Passau, Germany

Embedded Security

Protocols

Highly Constrained Embedded Systems

Security

Smart Card Security

Algorithms

Hardware Implementations

Embedded Systems

Anonymity/Database Security

a service of Schloss Dagstuhl - Leibniz Center for Informatics