Information Security Theory And Practices. Smart Cards Mobile And Ubiquitous Computing Systems2007 Edition at Meripustak

Information Security Theory And Practices. Smart Cards Mobile And Ubiquitous Computing Systems2007 Edition

Books from same Author: Damien Sauveron Konstantinos Markantonakis

Books from same Publisher: Springer

Related Category: Author List / Publisher List


  • Retail Price: ₹ 6834/- [ 0.00% off ]

    Seller Price: ₹ 6834

Sold By: T K Pandey      Click for Bulk Order

Offer 1: Get ₹ 111 extra discount on minimum ₹ 500 [Use Code: Bharat]

Offer 2: Get 0.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 0.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available



Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)Damien Sauveron Konstantinos Markantonakis
    PublisherSpringer
    ISBN9783540723530
    Pages255
    BindingPaperback
    LanguageEnglish
    Publish YearJune 2007

    Description

    Springer Information Security Theory And Practices. Smart Cards Mobile And Ubiquitous Computing Systems2007 Edition by Damien Sauveron Konstantinos Markantonakis

    This volume constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices: Smart Cards Mobile and Ubiquitous Computing Systems WISTP 2007 held in Heraklion Crete Greece in May 2007.The 20 revised full papers are organized in topical sections on mobility hardware and cryptography privacy cryptography schemes smart cards and small devices. Table of contents : Mobility.- A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks.- A New Resilient Key Management Protocol for Wireless Sensor Networks.- Hardware and Cryptography I.- Efficient Use of Random Delays in Embedded Software.- Enhanced Doubling Attacks on Signed-All-Bits Set Recoding.- Privacy.- Securing the Distribution and Storage of Secrets with Trusted Platform Modules.- Distributed Certified Information Access for Mobile Devices.- Cryptography Scheme.- Linkability of Some Blind Signature Schemes.- Optimistic Non-repudiation Protocol Analysis.- Secure Remote User Authentication Scheme Using Bilinear Pairings.- Cryptanalysis of Some Proxy Signature Schemes Without Certificates.- Smart Card.- Performance Evaluation of Java Card Bytecodes.- Reverse Engineering Java Card Applets Using Power Analysis.- An Embedded System for Practical Security Analysis of Contactless Smartcards.- A Comparative Analysis of Common Threats Vulnerabilities Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies.- Small Devices.- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication.- An Information Flow Verifier for Small Embedded Systems.- Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks.- Hardware and Cryptography II.- Fault Attacks for CRT Based RSA: New Attacks New Results and New Countermeasures.- CRT RSA Algorithm Protected Against Fault Attacks.- Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks.