© 2009

Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks

Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings

  • Olivier Markowitch
  • Angelos Bilas
  • Jaap-Henk Hoepman
  • Chris J. Mitchell
  • Jean-Jacques Quisquater
Conference proceedings WISTP 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5746)

Table of contents

  1. Front Matter
  2. Mobility

    1. Olivier Heen, Gilles Guette, Thomas Genet
      Pages 1-11
    2. Marc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-Díaz
      Pages 12-27
    3. Shinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima
      Pages 28-37
  3. Attacks and Secure Implementations

    1. Ton van Deursen, Saša Radomirović
      Pages 38-51
    2. Helen Balinsky, Edward McDonnell, Liqun Chen, Keith Harrison
      Pages 52-67
    3. Emmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra
      Pages 68-83
  4. Performance and Security

    1. Pierre Paradinas, Julien Cordry, Samia Bouzefrane
      Pages 84-94
    2. Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich
      Pages 112-127
  5. Cryptography

    1. J. A. M. Naranjo, J. A. López-Ramos, L. G. Casado
      Pages 128-142
    2. Jose L. Muñoz, Oscar Esparza, Carlos Gañán, Javier Parra-Arnau
      Pages 153-166
  6. Back Matter

About these proceedings


This volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP 2009 held in Brussels, Belgium in September 2009.

The 12 revised full papers presented were carefully reviewed and selected from 27 submissions for inclusion in the book; they are organized in topical sections on mobility, attacks and secure implementations, performance and security, and cryptography.


Java Card RFID RSA authentication collision attacks cryptography data security key distribution manet mobile ad hoc network mobile agent systems overlay networks p2p streamin wireless sensor networks

Editors and affiliations

  • Olivier Markowitch
    • 1
  • Angelos Bilas
    • 2
  • Jaap-Henk Hoepman
    • 3
  • Chris J. Mitchell
    • 4
  • Jean-Jacques Quisquater
    • 5
  1. 1.Université Libre de BruxellesBruxellesBelgium
  2. 2.Institute of Computer Science (ICS)Foundation for Research and Technology - Hellas (FORTH)Vassilika VoutonGreece
  3. 3.TNO, Eemsgolaan 3, P O Box 1416, 9701 BK Groningen, The Netherlands and Institute for Computing and Information Sciences, Radboud University Nijmegen, P.O. Box 9010, 6500, GL NijmegenThe Netherlands
  4. 4.Information Security GroupRoyal Holloway University of LondonEghamUK
  5. 5.Microelectronics LaboratoryUniversité Catholique de LouvainLouvain-la-NeuveBelgium

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking