default search action
7. WISTP 2013: Heraklion, Greece
- Lorenzo Cavallaro
, Dieter Gollmann:
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings. Lecture Notes in Computer Science 7886, Springer 2013, ISBN 978-3-642-38529-2
Cryptography and Cryptanalysis
- Kun Peng, Matt Henricksen:
Multiplicative Homomorphic E-Auction with Formally Provable Security. 1-17 - Henrich Christopher Pöhls, Stefan Peters, Kai Samelin, Joachim Posegga, Hermann de Meer:
Malleable Signatures for Resource Constrained Platforms. 18-33 - Panagiotis Ilia
, George C. Oikonomou
, Theo Tryfonas
:
Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks. 34-49
Mobile Security
- Daniel Schreckling, Stephan Huber, Focke Höhne, Joachim Posegga:
URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security. 50-65 - Max Günther, Bernd Borchert:
Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphone. 66-81
Smart Cards and Embedded Devices
- Michael Lackner, Reinhard Berlach, Wolfgang Raschke, Reinhold Weiss, Christian Steger:
A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards. 82-97 - Daisuke Moriyama, Miyako Ohkubo, Shin'ichiro Matsuo:
A Forward Privacy Model for RFID Authentication Protocols. 98-111 - Simon Hoerder
, Kimmo Järvinen, Daniel Page:
On Secure Embedded Token Design. 112-128 - Pierre Dusart, Sinaly Traoré:
Lightweight Authentication Protocol for Low-Cost RFID Tags. 129-144
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.