Sold Out
Book Categories |
Smart Devices
Untraceability of RFID Protocols Ton van Deursen van Deursen, Ton Sjouke Mauw Mauw, Sjouke Sasa Radomirovic Radomirovic, Sasa 1
A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices Luigi Catuogno Catuogno, Luigi Clemente Galdi Galdi, Clemente 16
Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information Matthew Judge Judge, Matthew Paul Williams Williams, Paul Yong Kim Yong, Kim Barry Mullins Mullins, Barry 36
Network Security
Probabilistic Identification for Hard to Classify Protocol Elie Bursztein Bursztein, Elie 49
A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup Christer Andersson Andersson, Christer Markulf Kohlweiss Kohlweiss, Markulf Leonardo A. Martucci Martucci, Leonardo A. Andriy Panchenko Panchenko, Andriy 64
Availability for DHT-Based Overlay Networks with Unidirectional Routing Jan Seedorf Seedorf, Jan Christian Muus Muus, Christian 78
Convergence
Network Smart Card Performing U(SIM) Functionalities in AAA Protocol Architectures Joaquin Torres Torres, Joaquin Antonio Izquierdo Izquierdo, Antonio Mildrey Carbonell Carbonell, Mildrey Jose M. Sierra Sierra, Jose M. 92
Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs) Gilles Guette Guette, Gilles Ciaran Bryce Bryce, Ciaran 106
Cryptography
Algebra for Capability Based Attack Correlation Navneet Kumar Pandey Pandey, Navneet Kumar S. K. Gupta Gupta, S. K. Shaveta Leekha Leekha, Shaveta 117
On the BRIP Algorithms Security for RSA Frederic Amiel Amiel, Frederic Benoit Feix Feix, Benoit 136
Author Index 151
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionInformation Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second Ifip Wg 11.2 International Workshop, Wistp
X
This Item is in Your InventoryInformation Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second Ifip Wg 11.2 International Workshop, Wistp
X
You must be logged in to review the productsX
X
X
Add Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second Ifip Wg 11.2 International Workshop, Wistp, This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008. T, Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second Ifip Wg 11.2 International Workshop, Wistp to the inventory that you are selling on WonderClubX
X
Add Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second Ifip Wg 11.2 International Workshop, Wistp, This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks, WISTP 2008, held in Seville, Spain, in May 2008. T, Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second Ifip Wg 11.2 International Workshop, Wistp to your collection on WonderClub |