000 03680nam a22005775i 4500
001 978-3-540-79966-5
003 DE-He213
005 20170628034901.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 _a9783540799665
_9978-3-540-79966-5
024 7 _a10.1007/978-3-540-79966-5
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
100 1 _aOnieva, Jose A.
_eeditor.
245 1 0 _aInformation Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks
_h[electronic resource] :
_bSecond IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings /
_cedited by Jose A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2008.
300 _bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v5019
505 0 _aSmart Devices -- Untraceability of RFID Protocols -- A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices -- Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information -- Network Security -- Probabilistic Identification for Hard to Classify Protocol -- A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup -- Availability for DHT-Based Overlay Networks with Unidirectional Routing -- Convergence -- Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures -- Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs) -- Cryptography -- Algebra for Capability Based Attack Correlation -- On the BRIP Algorithms Security for RSA.
520 _aThis volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008. The 10 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book; they examine the rapid development of information technologies and the transition to next generation networks. The papers focus on the security of these complex and resource-constrained systems and are organized in topical sections on smart devices, network security, convergence, and cryptography.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData protection.
650 0 _aData encryption (Computer science).
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aSystems and Data Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aComputers and Society.
700 1 _aSauveron, Damien.
_eeditor.
700 1 _aChaumette, Serge.
_eeditor.
700 1 _aGollmann, Dieter.
_eeditor.
700 1 _aMarkantonakis, Konstantinos.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540799658
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v5019
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-540-79966-5
912 _aZDB-2-SCS
912 _aZDB-2-LNC
999 _c21955
_d21955