Information security theory and practice securing the internet of things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30-July 2, 2014 : proceedings /

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were car...

Full description

Corporate Authors: WISTP (Workshop) Ērakleion, Greece)
Other Authors: WISTP (Workshop), Naccache, David, 1967-, Sauveron, Damien,, SpringerLink (Online service)
Format: eBook
Language: English
Published: Cham : Springer, [2014]
Physical Description: 1 online resource (xviii, 199 pages) : illustrations.
Series: Lecture notes in computer science ; 8501.
LNCS sublibrary. Security and cryptology.
Subjects:
LEADER 06292cam a2201117 i 4500
001 882282275
003 OCoLC
005 20240223121953.0
006 m o d
007 cr |||||||||||
008 140701s2014 sz a ob 101 0 eng d
016 7 |a 016809243  |2 Uk 
020 |a 9783662438268  |q (electronic bk.) 
020 |a 3662438267  |q (electronic bk.) 
020 |z 9783662438251  |q (print) 
020 |z 3662438259  |q (print) 
024 7 |a 10.1007/978-3-662-43826-8  |2 doi 
035 |a (OCoLC)882282275 
040 |a NLGGC  |b eng  |e rda  |e pn  |c NLGGC  |d OCLCO  |d GW5XE  |d COO  |d YDXCP  |d UKMGB  |d OCLCF  |d UPM  |d OHI  |d OCLCO  |d OCL  |d OCLCO  |d EBLCP  |d DIBIB  |d OCLCO  |d OCLCQ  |d ESU  |d IOG  |d NJR  |d OCLCA  |d BUF  |d OCLCQ  |d CEF  |d DEHBZ  |d OCLCQ  |d U3W  |d AU@  |d WYU  |d YOU  |d OCLCQ  |d WURST  |d LUN  |d AJS  |d OCLCQ  |d OCLCO  |d COM  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d OCLCQ 
049 |a COM6 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8/2  |2 23 
084 |a 54.62  |2 bcl 
084 |a 54.32  |2 bcl 
084 |a 54.80  |2 bcl 
111 2 |a WISTP (Workshop)  |n (8th :  |d 2014 :  |c Ērakleion, Greece) 
245 1 0 |a Information security theory and practice :  |b securing the internet of things : 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30-July 2, 2014 : proceedings /  |c David Naccache, Damien Sauveron (Eds.). 
246 3 |a WISTP 2014. 
264 1 |a Cham :  |b Springer,  |c [2014] 
264 4 |c ©2014. 
300 |a 1 online resource (xviii, 199 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file  |b PDF  |2 rda. 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 8501. 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology. 
500 |a International conference proceedings. 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed July 7, 2014). 
505 0 |a Sweet Dreams and Nightmares: Security in the Internet of Things -- A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations -- Towards More Practical Time-Driven Cache Attacks -- Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Built in Protection against Side-Channel and Fault Attacks -- New Countermeasures against Fault and Software Type Confusion Attacks on Java Cards -- A Pre-processing Composition for Secret Key Recovery on Android Smartphone -- Usable Privacy for Mobile Sensing Applications -- A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection -- End-to-End Secure and Privacy Preserving Mobile Chat Application -- S-box, SET, Match: A Toolbox for S-box Analysis -- Policy-Based Access Control for Body Sensor Networks -- Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity Provider -- CAN Bus Risk Analysis Revisit -- AU2EU: Privacy-Preserving Matching of DNA Sequences -- Early DDoS Detection Based on Data Mining Techniques. 
520 |a This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy. 
650 0 |a Computer security  |v Congresses. 
650 0 |a Ubiquitous computing  |v Congresses. 
650 6 |a Sécurité informatique  |v Congrès. 
650 6 |a Informatique omniprésente  |v Congrès. 
650 7 |a Computer security.  |2 fast. 
650 7 |a Ubiquitous computing.  |2 fast. 
653 0 0 |a computerwetenschappen. 
653 0 0 |a computer sciences. 
653 0 0 |a gegevensbeheer. 
653 0 0 |a data management. 
653 0 0 |a computernetwerken. 
653 0 0 |a computer networks. 
653 1 0 |a Information and Communication Technology (General) 
653 1 0 |a Informatie- en communicatietechnologie (algemeen) 
655 2 |a Congress. 
655 7 |a proceedings (reports)  |2 aat. 
655 7 |a Conference papers and proceedings.  |2 fast. 
655 7 |a Conference papers and proceedings.  |2 lcgft. 
655 7 |a Actes de congrès.  |2 rvmgf. 
700 1 |a Naccache, David,  |d 1967-  |1 https://id.oclc.org/worldcat/entity/E39PBJycMkf4yfYB6mhhHx8wG3,  |e editor. 
700 1 |a Sauveron, Damien,  |e editor. 
710 2 |a SpringerLink (Online service) 
776 0 8 |i Printed edition:  |z 9783662438251. 
830 0 |a Lecture notes in computer science ;  |v 8501.  |x 1611-3349. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology. 
907 |a .b42440658  |b multi  |c -  |d 140718  |e 240320 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g sz   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comp, in 2022.12 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Comp, 2019.05 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE Comp, 2017.10 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2022.12 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2019.05 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.10 
995 |a Loaded with m2btab.ltiac in 2017.10 
995 |a Loaded with m2btab.ltiac in 2017.08 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a OCLC offline update by CMU 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150385596  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-662-43826-8  |3 SpringerLink  |z Click here for access