Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings /

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were car...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Naccache, David. (Editor, http://id.loc.gov/vocabulary/relators/edt), Sauveron, Damien. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014.
Edition:1st ed. 2014.
Series:Security and Cryptology ; 8501
Subjects:
Online Access:https://doi.org/10.1007/978-3-662-43826-8
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Sweet Dreams and Nightmares: Security in the Internet of Things
  • A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations
  • Towards More Practical Time-Driven Cache Attacks
  • Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Built in Protection against Side-Channel and Fault Attacks
  • New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards
  • A Pre-processing Composition for Secret Key Recovery on Android Smartphone
  • Usable Privacy for Mobile Sensing Applications
  • A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection
  • End-to-End Secure and Privacy Preserving Mobile Chat Application
  • S-box, SET, Match: A Toolbox for S-box Analysis
  • Policy-Based Access Control for Body Sensor Networks
  • Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider
  • CAN Bus Risk Analysis Revisit
  • AU2EU: Privacy-Preserving Matching of DNA Sequences
  • Early DDoS Detection Based on Data Mining Techniques.