


default search action
5. WISTP 2011: Heraklion, Crete, Greece
- Claudio A. Ardagna

, Jianying Zhou
:
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings. Lecture Notes in Computer Science 6633, Springer 2011, ISBN 978-3-642-21039-6
Keynote Speech
- Antoine Amarilli

, Sascha Müller, David Naccache, Dan Page, Pablo Rauzy
, Michael Tunstall
:
Can Code Polymorphism Limit Information Leakage? 1-21
Mobile Authentication and Access Control
- Chen Bangdao, A. W. Roscoe:

Mobile Electronic Identity: Securing Payment on Mobile Phones. 22-37 - Antonios Gouglidis, Ioannis Mavridis:

Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems. 38-53
Lightweight Authentication
- Chunhua Chen, Chris J. Mitchell

, Shaohua Tang:
SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key. 54-68 - Paolo D'Arco:

An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control. 69-84 - Mark Manulis

, Bertram Poettering:
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. 85-99
Algorithms
- Sylvain Guilley, Karim Khalfallah, Victor Lomné, Jean-Luc Danger:

Formal Framework for the Evaluation of Waveform Resynchronization Algorithms. 100-115 - Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda:

Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library. 116-127 - Alessandro Barenghi

, Gerardo Pelosi
, Yannick Teglia:
Information Leakage Discovery Techniques to Enhance Secure Chip Design. 128-143
Hardware Implementation
- Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer:

A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines. 144-159 - Simon Hoerder

, Marcin Wójcik, Stefan Tillich, Daniel Page:
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture. 160-174 - Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik How Tan:

A Comparison of Post-Processing Techniques for Biased Random Number Generators. 175-190
Security and Cryptography
- Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann:

AES Variants Secure against Related-Key Differential and Boomerang Attacks. 191-207 - Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger:

Leakage Squeezing Countermeasure against High-Order Attacks. 208-223
Security Attacks and Measures (Short Papers)
- Michael Tunstall

, Debdeep Mukhopadhyay, Subidh Ali
:
Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault. 224-233 - Reine Lundin, Stefan Lindskog:

Entropy of Selectively Encrypted Strings. 234-243 - Zbigniew Golebiewski, Krzysztof Majcher, Filip Zagórski

, Marcin Zawada
:
Practical Attacks on HB and HB+ Protocols. 244-253 - Mohammad Hassan Habibi, Mahdi R. Alaghband, Mohammad Reza Aref:

Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard. 254-263
Security Attacks
- Jingyu Hua, Kouichi Sakurai:

A SMS-Based Mobile Botnet Using Flooding Algorithm. 264-279 - Manuel San Pedro, Mate Soos, Sylvain Guilley:

FIRE: Fault Injection for Reverse Engineering. 280-293 - Zheng Gong, Marc X. Makkes

:
Hardware Trojan Side-Channels Based on Physical Unclonable Functions. 294-303
Security and Trust
- Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin

:
Formal Analysis of Security Metrics and Risk. 304-319 - Theodoros Ntouskas, Giorgos Pentafronimos, Spyridon Papastergiou:

STORM - Collaborative Security Management Environment. 320-335 - Andreas Noack:

Trust Agreement in Wireless Mesh Networks. 336-350
Mobile Application Security and Privacy (Short Papers)
- Kun Peng:

Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network. 351-360 - Christian Kahl, Stephen Crane, Markus Tschersich, Kai Rannenberg:

Privacy Respecting Targeted Advertising for Social Networks. 361-370 - Johann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger:

Privacy Protection for Smartphones: An Ontology-Based Firewall. 371-380 - Savvas Mousionis, Alex Vakaloudis

, Constantinos S. Hilas:
A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area. 381-389

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














