Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems
Springer Berlin (Verlag)
978-3-540-72353-0 (ISBN)
Mobility.- A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks.- A New Resilient Key Management Protocol for Wireless Sensor Networks.- Hardware and Cryptography I.- Efficient Use of Random Delays in Embedded Software.- Enhanced Doubling Attacks on Signed-All-Bits Set Recoding.- Privacy.- Securing the Distribution and Storage of Secrets with Trusted Platform Modules.- Distributed Certified Information Access for Mobile Devices.- Cryptography Scheme.- Linkability of Some Blind Signature Schemes.- Optimistic Non-repudiation Protocol Analysis.- Secure Remote User Authentication Scheme Using Bilinear Pairings.- Cryptanalysis of Some Proxy Signature Schemes Without Certificates.- Smart Card.- Performance Evaluation of Java Card Bytecodes.- Reverse Engineering Java Card Applets Using Power Analysis.- An Embedded System for Practical Security Analysis of Contactless Smartcards.- A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies.- Small Devices.- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication.- An Information Flow Verifier for Small Embedded Systems.- Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks.- Hardware and Cryptography II.- Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures.- CRT RSA Algorithm Protected Against Fault Attacks.- Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.
Erscheint lt. Verlag | 25.4.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 255 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 386 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Software Entwicklung ► Mobile- / App-Entwicklung | |
Schlagworte | authentication • auto-administration • Benchmarks • bilinear pairings • blind signature • Communication Security • Cryptanalysis • cryptographic protocols • cryptography • Data Security • Digital Signatures • fault attacks • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Identity Management • Information Security • java cards • mobile computing • Network Security • privacy • proxy signature • relay attack • RFID security • rsa • security • Security models • sensor networks • side channel attacks • Smart card • Smart cards • Stream Ciphers • symmetric key infrastructure • ubiquitous computing |
ISBN-10 | 3-540-72353-6 / 3540723536 |
ISBN-13 | 978-3-540-72353-0 / 9783540723530 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich