Table of Contents
Transkript
Table of Contents
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications LightSec 2011 Table of Contents Message from Program Chairs.................................................................................................................vii Organizing Committee..............................................................................................................................viii Additional Reviewers..................................................................................................................................ix Workshop Papers Practical and Secure Software-Based Attestation ........................................................................................1 Markus Jakobsson and Karl-Anders Johansson An Efficient Verifiable Implicit Asking Protocol for Diffie-Hellman Key Exchange ......................................10 Kazuomi Oishi and Tsutomu Matsumoto Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems .......................................................................................................................................20 Süleyman Kardaş, Mete Akgün, Mehmet Sabir Kiraz, and Hüseyin Demirci On Hardware-Oriented Message Authentication with Applications towards RFID ..............................................................................................................................................26 Martin Ågren, Martin Hell, and Thomas Johansson Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-distribution ....................................................................................................................................34 Kevin Henry and Douglas R. Stinson Short Group Signatures with Controllable Linkability ..................................................................................44 Jung Yeon Hwang, Sokjoon Lee, Byung-Ho Chung, Hyun Sook Cho, and DaeHun Nyang F-HB: An Efficient Forward Private Protocol ...............................................................................................53 Xiaolin Cao and Máire O'Neill Scalable and Efficient FPGA Implementation of Montgomery Inversion ....................................................61 Ertuğrul Murat, Süleyman Kardaş, and Erkay Savaş v Short-Key Certificateless Encryption ..........................................................................................................69 George Stephanides Towards an Ultra Lightweight Crypto Processor ........................................................................................76 Begul Bilgin, Elif Bilge Kavun, and Tolga Yalcin Author Index ..............................................................................................................................................84 vi
Benzer belgeler
Curriculum Vitae - Bilkent University Computer Engineering
• Program committee member, First National Cryptology Symposium, Ankara, Turkey, 2005.
• Program committee member, The 19th International Symposium on Computer and Information Sciences (ISCIS’04), ...
KRİPTOLOJİ PROGRAMI Neden Uygulamalı Matematik
P ro g ra m tezli v e tez siz y üksek lisan s v e d o k tora
se çen ek leri sunm ak tad ır. M a te m a tik alty ap ısı y eterli
o lm ay an ö ğ ren cilerin b ilim sel h a z ırlık derslerini
alm alar...
Poster of The Conference - International Islamophobia Conference
Executive Director, Kashmiri American Council (KAC)
HASAN ABOU TALEB / EGYPT
Assstant Director, Ahram Center for Political and Strategic
Studies
HAYTHAM MANNA, Dr. / FRANCE
Arab Commission for Huma...