Embedded Security |
Efficient and Effective Buffer Overflow Protection on ARM Processors / Raoul Strackx ; Yves Younan ; Pieter Philippaerts ; Frank Piessens |
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines / Alexandre Venelli |
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones / Tansu Alpcan ; Christian Bauckhage ; Aubrey-Derrick Schmidt |
A Smart Card Implementation of the McEliece PKC / Falko Strenzke |
Evaluation Metrics of Physical Non-invasive Security / Huiyun Li ; Keke Wu ; Fengqi Yu ; Hai Yuan |
Protocols |
Trust in Peer-to-Peer Content Distribution Protocols / Nicolai Kuntze ; Carsten Rudolph ; Andreas Fuchs |
Generic Constructions of Biometric Identity Based Encryption Systems / Neyire Deniz Sarier |
Design and Analysis of a Generalized Canvas Protocol / Marián Novotný |
Highly Constrained Embedded Systems |
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures / Michael Braun ; Ulrike Meyer ; Susanne Wetzel |
Practical Schemes for Privacy and Security Enhanced RFID (Extended Abstract) / Jaap-Henk Hoepman ; Rieks Joosten |
MoteAODV - An AODV Implementation for TinyOS 2.0 / Werner Backes ; Jared Cordasco |
Security |
Random Number Generation Based on Fingerprints / Shkodran Gerguri ; Václav Matyáš ; Zdenek RÃha ; Ludek SmolÃk |
Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML / Sergio Sánchez GarcÃa ; Ana Gómez Oliva |
Fraud Detection for Voice over IP Services on Next-Generation Networks / Igor Ruiz-Agundez ; Yoseba K. Penya ; Pablo Garcia Bringas |
Smart Card Security |
Proxy Smart Card Systems / Giuseppe Cattaneo ; Pompeo Faruolo ; Vincenzo Palazzo ; Ivan Visconti |
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? / Nicola Dragoni ; Olga Gadyatskaya ; Fabio Massacci |
Website Credential Storage and Two-Factor Web Authentication with a Java SIM / Jonathan Hart ; Konstantinos Markantonakis ; Keith Mayes |
Algorithms |
Attribute-Based Encryption with Break-Glass / Achim D. Brucker ; Helmut Petritsch ; Stefan G. Weber |
On the Security of a Two-Factor Authentication Scheme / Luigi Catuogno ; Clemente Galdi |
The Design of Secure and Efficient P2PSIP Communication Systems / Xianghan Zheng ; Vladimir Oleshchuk |
Hardware Implementations |
Novel FPGA-Based Signature Matching for Deep Packet Inspection / Nitesh B. Guinde ; Sotirios G. Ziavras |
Towards Electrical, Integrated Implementations of SIMPL Systems / Ulrich Rührmair ; Qingqing Chen ; Martin Stutzmann ; Paolo Lugli ; Ulf Schlichtmann ; György Csaba |
A Very Compact Hardware Implementation of the KASUMI Block Cipher / Dai Yamamoto ; Kouichi Itoh ; Jun Yajima |
Embedded Systems |
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions / Ronald Kainda ; Ivan Flechais ; A.W. Roscoe |
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions / Johannes Loinig ; Christian Steger ; Reinhold Weiss ; Ernst Haselsteiner |
Security Analysis of Mobile Phones Used as OTP Generators / Håvard Raddum ; Lars Hopland Nestås ; Kjell Jørgen Hole |
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks / Oscar Delgado-Mohatar ; José M. Sierra ; Ljiljana Brankovic ; Amparo Fúster-Sabater |
Anonymity/Database Security |
The Market Failure of Anonymity Services / Heiko Rossnagel |
Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios / Giovanni Russello ; Enrico Scalavino |
Predicting and Preventing Insider Threat in Relational Database Systems / Qussai Yaseen ; Brajendra Panda |
Author Index |
Embedded Security |
Efficient and Effective Buffer Overflow Protection on ARM Processors / Raoul Strackx ; Yves Younan ; Pieter Philippaerts ; Frank Piessens |
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines / Alexandre Venelli |