feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham, Switzerland :Springer,
    UID:
    almafu_BV047135904
    Format: 1 Online-Ressource.
    ISBN: 978-3-030-10591-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-10590-7
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Ubiquitous Computing ; Computersicherheit ; Kryptologie ; Aufsatzsammlung ; Aufsatzsammlung
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Springer Nature | Cham :Springer International Publishing :
    UID:
    almahu_9949280884302882
    Format: 1 online resource (XVIII, 265 p. 25 illus., 8 illus. in color.)
    Edition: 1st ed. 2021.
    ISBN: 3-030-10591-1
    Content: The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.
    Note: Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics. , English
    Additional Edition: ISBN 3-030-10590-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949301299702882
    Format: 1 online resource (268 pages)
    ISBN: 9783030105914
    Note: Intro -- Preface -- From the Cryptacus Project to the Cryptacus Book -- Book Contents -- Acknowledgements -- Contents -- Contributors -- Part I Introduction -- 1 Emerging Security Challenges for Ubiquitous Devices -- 1.1 Introduction -- 1.2 Malicious Devices and Watchdog Concept -- 1.2.1 Attacks by Malicious Devices -- 1.2.2 Active Watchdog Concept -- 1.2.3 Solution Strategy -- 1.2.3.1 Commitments: Problems with Solutions Based on Hash Functions -- 1.2.3.2 Commitments Based on Symmetric Encryption -- 1.2.3.3 Encrypted Random Challenge -- 1.2.3.4 Answers to Challenges -- 1.2.3.5 Distance Bounding Protocols -- 1.3 Privacy -- 1.3.1 Symmetric Protocols and Deniability -- 1.3.2 Identity Hiding with Random Key Predistribution -- 1.3.2.1 Key Discovery with a Bloom Filter -- 1.3.2.2 Multiple Shared Keys -- 1.3.2.3 Epoch Keys -- 1.3.3 Overloading Identifiers -- 1.3.4 Pairwise Keys Evolution -- 1.3.5 Transmission with Errors -- 1.4 Conclusion and Future Directions -- Part II Lightweight Cryptographic Primitives -- 2 Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- 2.1 Introduction -- 2.2 Catalog of Lightweight Cryptographic Primitives -- 2.2.1 Block Ciphers -- 2.2.2 Stream Ciphers -- 2.2.3 Hash Functions -- 2.2.4 Message Authentication Codes -- 2.2.5 Authenticated Encryption Schemes -- 2.3 Illustrative Issues in Security Evaluation of Certain Encryption Schemes -- 2.3.1 Reconsidering TMD Tradeoff Attacks for Lightweight Stream Cipher Designs -- 2.3.2 Guess-and-Determine Based Cryptanalysis Employing Dedicated TMD-TO -- 2.3.2.1 Generic Approach -- 2.3.2.2 Summary of Cryptanalysis of Grain-v1 Employing Guess-and-Determine and Dedicated TMD-TO Approaches -- 3 Selected Design and Analysis Techniques for Contemporary Symmetric Encryption -- 3.1 Introduction -- 3.2 Keystream Generators with Keyed Update Functions. , 3.2.1 Design Approach -- 3.2.2 On Continuously Accessing the Key -- 3.2.3 The Stream Ciphers Sprout and Plantlet -- 3.3 A Generic Attack Against Certain Keystream Generators with Keyed Update Functions -- 3.4 Randomized Encryption Employing Homophonic Coding -- 3.4.1 Background -- 3.4.2 Encryption and Decryption -- 3.4.3 Security Evaluation -- 3.5 Conclusion and Future Directions -- 4 An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- 4.1 Introduction -- 4.2 Simon and Speck -- 4.2.1 Simon -- 4.2.2 Speck -- 4.3 Simon and Speck's ``Design Rationale'' -- 4.3.1 Lack of New Information -- 4.3.2 Choice of the Number of Rounds -- 4.3.3 Misquoting Existing Work -- 4.4 The ISO/IEC JTC 1 Standardization Process -- 4.5 The Standardization Process of Simon and Speck in ISO/IEC 29192-2 -- Part III Authentication Protocols -- 5 ePassport and eID Technologies -- 5.1 Application Scenarios -- 5.1.1 Remote vs. Local Use -- 5.1.2 Actors and Scenarios -- 5.1.3 Goals of Protocol Execution -- 5.2 Threats and Security Requirements -- 5.2.1 Assets -- 5.2.2 Threats -- 5.3 Cryptographic Protocols for eIDs -- 5.3.1 Preventing eID Forgeries -- 5.3.2 Enforcing Owner's Consent -- 5.3.3 EID Authentication and Preventing Cloning -- 5.3.4 Authenticating the Terminal and Its Rights -- 5.3.5 Proof of Interaction -- 5.3.6 Passive Tracing -- 5.3.7 Eavesdropping -- Summary -- 5.4 PKI -- 5.5 Challenges for eID Systems -- 5.6 Future Directions -- 6 Ultra-lightweight Authentication -- 6.1 Introduction -- 6.1.1 A Fully Connected World of Small Devices -- 6.1.2 Authentication: Protocol Classification and Physical Constraints -- 6.1.3 Design Challenges -- 6.1.4 Organization of the Chapter -- 6.2 Ultra-lightweight Authentication Protocols -- 6.3 Weaknesses and Pitfalls -- 6.3.1 Poor Diffusion and Linearity -- 6.3.2 Poor Message Composition. , 6.3.3 Biased Output -- 6.3.4 Rotations -- 6.3.5 Vulnerability to Knowledge Accumulation -- 6.3.6 Dubious Proofs of Security: Randomness Tests and Automated Provers -- 6.4 Towards a Sound Approach -- 6.4.1 State of the Literature -- 6.4.2 Promising Avenues -- 6.4.3 The Reductionist Approach -- 6.5 Conclusions -- 7 From Relay Attacks to Distance-Bounding Protocols -- 7.1 An Introduction to Relay Attacks and Distance Bounding -- 7.1.1 Relay Attacks -- 7.1.2 Distance Bounding -- 7.1.3 Other Relay-Countermeasures -- 7.2 Relay Attacks in Practice -- 7.2.1 Basic Relay Strategies -- 7.2.1.1 Purpose-Built Relays -- 7.2.1.2 Off-the-Shelf Relays -- 7.2.2 Advanced Relay Strategies -- 7.2.2.1 Early Send and Late Commit -- 7.2.2.2 Speeding Up the Prover's Response -- 7.3 Canonical Distance-Bounding Protocols -- 7.3.1 General Structure -- 7.3.2 The Hancke-Kuhn Protocol -- 7.3.3 The Brands-Chaum Protocol -- 7.4 Distance-Bounding Threat Model and Its Formal Treatments -- 7.4.1 Main Threat-Model -- 7.4.1.1 Mafia Fraud (MF) [178] -- 7.4.1.2 Distance Fraud (DF) [113] -- 7.4.1.3 Distance Hijacking (DH) [160] -- 7.4.1.4 Terrorist Fraud (TF) [178] -- 7.4.2 Provable Security and Formal Verification -- 7.4.2.1 Symbolic Verification -- 7.4.2.2 Provable Security -- 7.4.2.3 Provably-(in)Secure Protocols -- 7.5 Distance-Bounding Protocols in Practice -- 7.5.1 NXP's Mifare Technology -- 7.5.2 3DB Technology -- 7.5.3 Relay-Resistance in EMV -- 7.6 Current Challenges in Distance Bounding -- 7.6.1 Theory vs. Practice -- 7.6.2 Application-Aware DB -- 7.6.3 Specialist Implementations and Slow Adoption -- Part IV Hardware Implementation and Systems -- 8 It Started with Templates: The Future of Profiling in Side-Channel Analysis -- 8.1 Introduction -- 8.2 Profiled Side-Channel Attacks -- 8.2.1 Definition of Profiling Attacks -- 8.2.2 Data Preprocessing -- 8.2.3 Feature Engineering. , 8.3 Template Attacks -- 8.3.1 Context of Template Attack -- 8.3.2 Standard Template Attack -- 8.3.3 Pooled Template Attack -- 8.3.4 Stochastic Attack -- 8.4 Machine Learning-Based Attacks -- 8.4.1 Conducting Sound Machine Learning Analysis -- 8.5 Performance Metrics -- 8.6 Countermeasures Against SCA -- 8.7 Conclusions -- 9 Side Channel Assessment Platforms and Tools for Ubiquitous Systems -- 9.1 Introduction -- 9.2 Side Channel Attacks, Leakage Assessment Methods and Problems -- 9.2.1 Side Channel Attack Categories -- 9.2.2 Leakage Assessment Using t-Test -- 9.2.3 Practical Considerations in SCA Trace Collection -- 9.3 Side Channel Attack Trace Collection Platforms -- 9.3.1 Proposing a Fast Trace Collection Approach Beyond the Traditional Model -- 9.4 A Use Case of a Flexible and Fast Platform for DUT SCA Evaluation -- 9.5 Conclusions -- 10 Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators -- 10.1 Introduction -- 10.2 Certification, Standards, and Testing -- 10.3 Challenges in Data Collection -- 10.4 Appropriate Selection of Tests -- 10.4.1 Randomness Testing Under Data Collection Constraints: Analyzing the DESFire EV1 -- 10.4.2 Identifying Issues with Quantum Random Number Generators -- 10.5 Conclusion -- 11 Finding Software Bugs in Embedded Devices -- 11.1 The Challenges of Embedded Devices and Software -- 11.1.1 Lack of Transparency -- 11.1.2 Lack of Control -- 11.1.3 Lack of Resistance to Attacks -- 11.1.4 Organization of This Chapter -- 11.1.5 Classification of Embedded Systems -- 11.2 Obtaining Firmware and Its Components -- 11.2.1 Collecting Firmware Packages -- 11.2.2 Extracting Firmware from Devices -- 11.2.3 Unpacking Firmware -- 11.2.4 Firmware Unpacking Frameworks -- 11.2.5 Modifying and Repacking Firmware -- 11.3 Static Firmware Analysis -- 11.3.1 Simple Static Analysis on Firmware Packages. , 11.3.1.1 Configuration Analysis -- 11.3.1.2 Software Version Analysis -- 11.3.2 Static Code Analysis of Firmware Packages -- 11.3.2.1 Code Analysis of Embedded Firmware -- 11.3.2.2 Discovering Backdoors with Static Analysis -- 11.3.2.3 Example Static Analysis to Discover Code Parsers -- 11.4 Dynamic Firmware Analysis -- 11.4.1 Device-Interactive Dynamic Analysis Without Emulation -- 11.4.2 Device-Interactive Dynamic Analysis with Emulation -- 11.4.3 Device-Less Dynamic Analysis and Emulation -- 11.5 Conclusion -- Part V Privacy and Forensics -- 12 Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- 12.1 Introduction -- 12.1.1 Goal and Plan of the Chapter -- 12.2 Background and Previous Work on Privacy in UCS -- 12.3 5-D Classification and Analysis of Privacy Risks -- 12.3.1 Identity Privacy -- 12.3.2 Query Privacy -- 12.3.3 Location Privacy -- 12.3.4 Footprint Privacy -- 12.3.5 Intelligence Privacy -- 12.4 Future Trends and Challenges -- 12.4.1 Privacy by Design -- 12.4.2 Individual-Centred Privacy -- 12.4.3 Growing Importance of Legislation -- 12.5 Conclusions -- 13 IoT Forensics -- 13.1 Introduction -- 13.2 Forensics -- 13.2.1 Digital Device Forensics -- 13.2.2 Other Digital Forensics -- 13.2.3 The Need for IoT Forensics -- 13.3 Challenges in IoT Forensics -- 13.3.1 General Issues -- 13.3.2 Evidence Identification, Collection and Preservation -- 13.3.3 Evidence Analysis and Correlation -- 13.3.4 Presentation -- 13.4 Opportunities of IoT Forensics -- 13.5 An Example of an IoT Forensics Case -- 13.6 Research Overview -- 13.6.1 New Models and Frameworks -- 13.6.2 Preparation Step with Repository -- 13.6.3 Real-World Systems -- 13.7 Conclusion and Future Research Directions -- References.
    Additional Edition: Print version: Avoine, Gildas Security of Ubiquitous Computing Systems Cham : Springer International Publishing AG,c2021 ISBN 9783030105907
    Language: English
    Keywords: Electronic books. ; Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_BV041261793
    Format: X, 141 S. : , graph. Darst.
    ISBN: 3-642-40391-3 , 978-3-642-40391-0
    Series Statement: Lecture notes in computer science 8162
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-3-642-40392-7
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Privatsphäre ; Blockchiffre ; Kryptoanalyse ; Kryptosystem ; Sicherheitsprotokoll ; Konferenzschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Springer Nature
    UID:
    gbv_1778419895
    Format: 1 Online-Ressource (265 p.)
    ISBN: 9783030105914
    Content: The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license
    Note: English
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9947364455202882
    Format: X, 143 p. 24 illus. , online resource.
    ISBN: 9783642403927
    Series Statement: Lecture Notes in Computer Science, 8162
    Content: This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in Gebze, Turkey, during May 6-7, 2013. The 10 full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are grouped in topical sections on efficient Implementations and designs, block cipher cryptanalysis, wireless sensor networks, and cryptographic protocols.
    Note: Efficient Implementations and designs -- A Lightweight ATmega-based Application-Specific Instruction-Set Processor for Elliptic Curve Cryptography -- ITUbee: A Software Oriented Lightweight Block Cipher -- Block Cipher Cryptanalysis -- Related-Key Slide Attacks on Block Ciphers with Secret Components -- Differential Fault Attack on the PRINCE Block Cipher -- Multidimensional Meet-in-the-Middle Attacks on Reduced-Round TWINE-128 -- Wireless Sensor Networks -- An Implementation of the Hash-Chain Signature Scheme for Wireless Sensor Networks -- An adaptive security architecture for location privacy sensitive sensor network applications -- Cryptographic Protocols -- Secure & Lightweight Distance-Bounding -- Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol -- An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783642403910
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Springer Nature | Cham :Springer International Publishing :
    UID:
    edocfu_9959754296202883
    Format: 1 online resource (XVIII, 265 p. 25 illus., 8 illus. in color.)
    Edition: 1st ed. 2021.
    ISBN: 3-030-10591-1
    Content: The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.
    Note: Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics. , English
    Additional Edition: ISBN 3-030-10590-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Springer Nature | Cham :Springer International Publishing :
    UID:
    edoccha_9959754296202883
    Format: 1 online resource (XVIII, 265 p. 25 illus., 8 illus. in color.)
    Edition: 1st ed. 2021.
    ISBN: 3-030-10591-1
    Content: The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.
    Note: Part I: Introduction -- Emerging Security Challenges for Ubiquitous Devices -- Part II: Lightweight Cryptographic Primitives -- Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- Selected Design and Analysis Techniques in Contemporary Symmetric Encryption -- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- Part III: Authentication Protocols -- ePassport and eID Technologies -- Ultra-lightweight Authentication -- From Relay Attacks to Distance-Bounding Protocols -- Part IV: Hardware Implementation and Systems -- It Started With Templates: The Future of Profiling in Side-Channel Analysis -- Side Channel Attack Assessment Platforms and Tools for Ubiquitous Systems -- Challenges in Certifying Small-scale (IoT) Hardware Random Number Generators -- Finding Software Bugs in Embedded Devices -- Part V: Privacy and Forensics -- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- IoT Forensics. , English
    Additional Edition: ISBN 3-030-10590-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    b3kat_BV041437464
    Format: 1 Online-Ressource (X, 141 S.) , graph. Darst.
    ISBN: 9783642403910 , 9783642403927 , 3642403913
    Series Statement: Lecture notes in computer science 8162
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Privatsphäre ; Blockchiffre ; Kryptoanalyse ; Kryptosystem ; Sicherheitsprotokoll ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Cham, Switzerland :Springer,
    UID:
    edocfu_BV047135904
    Format: 1 Online-Ressource.
    ISBN: 978-3-030-10591-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-10590-7
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Ubiquitous Computing ; Computersicherheit ; Kryptologie ; Aufsatzsammlung
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages