Efficient and Effective Buffer Overflow Protection on ARM Processors / Raoul Strackx ; Yves Younan ; Pieter Philippaerts ; Frank Piessens
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines / Alexandre Venelli
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones / Tansu Alpcan ; Christian Bauckhage ; Aubrey-Derrick Schmidt
A Smart Card Implementation of the McEliece PKC / Falko Strenzke
Evaluation Metrics of Physical Non-invasive Security / Huiyun Li ; Keke Wu ; Fengqi Yu ; Hai Yuan
Protocols
Trust in Peer-to-Peer Content Distribution Protocols / Nicolai Kuntze ; Carsten Rudolph ; Andreas Fuchs
Generic Constructions of Biometric Identity Based Encryption Systems / Neyire Deniz Sarier
Design and Analysis of a Generalized Canvas Protocol / Marián Novotný
Highly Constrained Embedded Systems
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures / Michael Braun ; Ulrike Meyer ; Susanne Wetzel
Practical Schemes for Privacy and Security Enhanced RFID (Extended Abstract) / Jaap-Henk Hoepman ; Rieks Joosten
MoteAODV - An AODV Implementation for TinyOS 2.0 / Werner Backes ; Jared Cordasco
Security
Random Number Generation Based on Fingerprints / Shkodran Gerguri ; Václav Matyáš ; Zdenek RÃha ; Ludek SmolÃk
Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML / Sergio Sánchez GarcÃa ; Ana Gómez Oliva
Fraud Detection for Voice over IP Services on Next-Generation Networks / Igor Ruiz-Agundez ; Yoseba K. Penya ; Pablo Garcia Bringas
Smart Card Security
Proxy Smart Card Systems / Giuseppe Cattaneo ; Pompeo Faruolo ; Vincenzo Palazzo ; Ivan Visconti
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? / Nicola Dragoni ; Olga Gadyatskaya ; Fabio Massacci
Website Credential Storage and Two-Factor Web Authentication with a Java SIM / Jonathan Hart ; Konstantinos Markantonakis ; Keith Mayes
Algorithms
Attribute-Based Encryption with Break-Glass / Achim D. Brucker ; Helmut Petritsch ; Stefan G. Weber
On the Security of a Two-Factor Authentication Scheme / Luigi Catuogno ; Clemente Galdi
The Design of Secure and Efficient P2PSIP Communication Systems / Xianghan Zheng ; Vladimir Oleshchuk
Hardware Implementations
Novel FPGA-Based Signature Matching for Deep Packet Inspection / Nitesh B. Guinde ; Sotirios G. Ziavras
Towards Electrical, Integrated Implementations of SIMPL Systems / Ulrich Rührmair ; Qingqing Chen ; Martin Stutzmann ; Paolo Lugli ; Ulf Schlichtmann ; György Csaba
A Very Compact Hardware Implementation of the KASUMI Block Cipher / Dai Yamamoto ; Kouichi Itoh ; Jun Yajima
Embedded Systems
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions / Ronald Kainda ; Ivan Flechais ; A.W. Roscoe
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions / Johannes Loinig ; Christian Steger ; Reinhold Weiss ; Ernst Haselsteiner
Security Analysis of Mobile Phones Used as OTP Generators / Håvard Raddum ; Lars Hopland Nestås ; Kjell Jørgen Hole
ACM Workshop on Security of Ad Hoc and Sensor Networks, Vijay Atluri, Wenliang Du, Peng Ning, Pierangela Samarati, Association for Computing Machinery-Digital Library., Association for Computing Machinery.
Efficient and Effective Buffer Overflow Protection on ARM Processors / Raoul Strackx ; Yves Younan ; Pieter Philippaerts ; Frank Piessens
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines / Alexandre Venelli
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones / Tansu Alpcan ; Christian Bauckhage ; Aubrey-Derrick Schmidt
A Smart Card Implementation of the McEliece PKC / Falko Strenzke
Evaluation Metrics of Physical Non-invasive Security / Huiyun Li ; Keke Wu ; Fengqi Yu ; Hai Yuan
Protocols
Trust in Peer-to-Peer Content Distribution Protocols / Nicolai Kuntze ; Carsten Rudolph ; Andreas Fuchs
Generic Constructions of Biometric Identity Based Encryption Systems / Neyire Deniz Sarier
Design and Analysis of a Generalized Canvas Protocol / Marián Novotný
Highly Constrained Embedded Systems
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures / Michael Braun ; Ulrike Meyer ; Susanne Wetzel
Practical Schemes for Privacy and Security Enhanced RFID (Extended Abstract) / Jaap-Henk Hoepman ; Rieks Joosten
MoteAODV - An AODV Implementation for TinyOS 2.0 / Werner Backes ; Jared Cordasco
Security
Random Number Generation Based on Fingerprints / Shkodran Gerguri ; Václav Matyáš ; Zdenek RÃha ; Ludek SmolÃk
Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML / Sergio Sánchez GarcÃa ; Ana Gómez Oliva
Fraud Detection for Voice over IP Services on Next-Generation Networks / Igor Ruiz-Agundez ; Yoseba K. Penya ; Pablo Garcia Bringas
Smart Card Security
Proxy Smart Card Systems / Giuseppe Cattaneo ; Pompeo Faruolo ; Vincenzo Palazzo ; Ivan Visconti
Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? / Nicola Dragoni ; Olga Gadyatskaya ; Fabio Massacci
Website Credential Storage and Two-Factor Web Authentication with a Java SIM / Jonathan Hart ; Konstantinos Markantonakis ; Keith Mayes
Algorithms
Attribute-Based Encryption with Break-Glass / Achim D. Brucker ; Helmut Petritsch ; Stefan G. Weber
On the Security of a Two-Factor Authentication Scheme / Luigi Catuogno ; Clemente Galdi
The Design of Secure and Efficient P2PSIP Communication Systems / Xianghan Zheng ; Vladimir Oleshchuk
Hardware Implementations
Novel FPGA-Based Signature Matching for Deep Packet Inspection / Nitesh B. Guinde ; Sotirios G. Ziavras
Towards Electrical, Integrated Implementations of SIMPL Systems / Ulrich Rührmair ; Qingqing Chen ; Martin Stutzmann ; Paolo Lugli ; Ulf Schlichtmann ; György Csaba
A Very Compact Hardware Implementation of the KASUMI Block Cipher / Dai Yamamoto ; Kouichi Itoh ; Jun Yajima
Embedded Systems
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions / Ronald Kainda ; Ivan Flechais ; A.W. Roscoe
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions / Johannes Loinig ; Christian Steger ; Reinhold Weiss ; Ernst Haselsteiner
Security Analysis of Mobile Phones Used as OTP Generators / Håvard Raddum ; Lars Hopland Nestås ; Kjell Jørgen Hole