Abstract is missing.
- A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc NetworksEve Atallah, Serge Chaumette. 1-13 [doi]
- A New Resilient Key Management Protocol for Wireless Sensor NetworksChakib Bekara, Maryline Laurent-Maknavicius. 14-26 [doi]
- Efficient Use of Random Delays in Embedded SoftwareMichael Tunstall, Olivier Benoît. 27-38 [doi]
- Enhanced Doubling Attacks on Signed-All-Bits Set RecodingHeeseok Kim, Tae-Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim. 39-52 [doi]
- Securing the Distribution and Storage of Secrets with Trusted Platform ModulesPaul E. Sevinç, Mario Strasser, David A. Basin. 53-66 [doi]
- Distributed Certified Information Access for Mobile DevicesAniello Del Sorbo, Clemente Galdi, Giuseppe Persiano. 67-79 [doi]
- Linkability of Some Blind Signature SchemesSwee-Huay Heng, Wun-She Yap, Khoongming Khoo. 80-89 [doi]
- Optimistic Non-repudiation Protocol AnalysisJudson Santiago, Laurent Vigneron. 90-101 [doi]
- Secure Remote User Authentication Scheme Using Bilinear PairingsEun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo. 102-114 [doi]
- Cryptanalysis of Some Proxy Signature Schemes Without CertificatesWun-She Yap, Swee-Huay Heng, Bok-Min Goi. 115-126 [doi]
- Performance Evaluation of Java Card BytecodesPierre Paradinas, Julien Cordry, Samia Bouzefrane. 127-137 [doi]
- Reverse Engineering Java Card Applets Using Power AnalysisDennis Vermoen, Marc F. Witteman, Georgi Gaydadjiev. 138-149 [doi]
- An Embedded System for Practical Security Analysis of Contactless SmartcardsTimo Kasper, Dario Carluccio, Christof Paar. 150-160 [doi]
- A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node TechnologiesKevin Eagles, Constantinos Markantonakis, Keith Mayes. 161-174 [doi]
- Mobile Phones as Secure Gateways for Message-Based Ubiquitous CommunicationWalter Bamberger, Oliver Welter, Stephan Spitz. 175-188 [doi]
- An Information Flow Verifier for Small Embedded SystemsDorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl. 189-201 [doi]
- Survey and Benchmark of Stream Ciphers for Wireless Sensor NetworksNicolas Fournel, Marine Minier, Stéphane Ubéda. 202-214 [doi]
- Fault Attacks for CRT Based RSA: New Attacks, New Results, and New CountermeasuresChong Hee Kim, Jean-Jacques Quisquater. 215-228 [doi]
- CRT RSA Algorithm Protected Against Fault AttacksArnaud Boscher, Robert Naciri, Emmanuel Prouff. 229-243 [doi]
- Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel AttacksFrank Vater, Steffen Peter, Peter Langendörfer. 244-253 [doi]