index - Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication
Claudio Ardagna, Jianying Zhou (Eds.)
Front Matter

Keynote Speech


Can code polymorphism limit information leakage?
Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall
1-21

Mobile Authentication and Access Control


Mobile Electronic Identity: Securing Payment on Mobile Phones
Chen Bangdao, A. Roscoe
22-37
Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems
Antonios Gouglidis, Ioannis Mavridis
38-53

Lightweight Authentication


SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
Chunhua Chen, Chris Mitchell, Shaohua Tang
54-68
An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control
Paolo D’arco
69-84
Affiliation-Hiding Authentication with Minimal Bandwidth Consumption
Mark Manulis, Bertram Poettering
85-99

Algorithms


Formal Framework for the Evaluation of Waveform Resynchronization Algorithms
Sylvain Guilley, Karim Khalfallah, Victor Lomne, Jean-Luc Danger
100-115
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
116-127
Information Leakage Discovery Techniques to Enhance Secure Chip Design
Alessandro Barenghi, Gerardo Pelosi, Yannick Teglia
128-143

Hardware Implementation


A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines
Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer
144-159
An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
Simon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page
160-174
A Comparison of Post-Processing Techniques for Biased Random Number Generators
Siew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik-How Tan
175-190

Security and Cryptography


AES Variants Secure against Related-Key Differential and Boomerang Attacks
Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann
191-207
Leakage Squeezing Countermeasure against High-Order Attacks
Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger
208-223

Security Attacks and Measures (Short Papers)


Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault
Michael Tunstall, Debdeep Mukhopadhyay, Subidh Ali
224-233
Entropy of Selectively Encrypted Strings
Reine Lundin, Stefan Lindskog
234-243
Practical Attacks on HB and HB+ Protocols
Zbigniew Gołębiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada
244-253
Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard
Mohammad Habibi, Mahdi Alagheband, Mohammad Aref
254-263

Security Attacks


A SMS-Based Mobile Botnet Using Flooding Algorithm
Jingyu Hua, Kouichi Sakurai
264-279
FIRE: fault injection for reverse engineering
Manuel San Pedro, Mate Soos, Sylvain Guilley
280-293
Hardware Trojan Side-Channels Based on Physical Unclonable Functions
Zheng Gong, Marc Makkes
294-303

Security and Trust


Formal Analysis of Security Metrics and Risk
Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin
304-319
STORM - Collaborative Security Management Environment
Theodoros Ntouskas, George Pentafronimos, Spyros Papastergiou
320-335
Trust Agreement in Wireless Mesh Networks
Andreas Noack
336-350

Mobile Application Security and Privacy (Short Papers)


Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network
Kun Peng
351-360
Privacy Respecting Targeted Advertising for Social Networks
Christian Kahl, Stephen Crane, Markus Tschersich, Kai Rannenberg
361-370
Privacy Protection for Smartphones: An Ontology-Based Firewall
Johann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger
371-380
A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area
Savvas Mousionis, Alex Vakaloudis, Constantinos Hilas
381-389

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/