Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones
The paper deals with the implementation and benchmarking of cryptographic primitives on contemporary smart-cards and smart-phones. The goal of the paper is to analyze the demands of today’s common theoretical cryptographic constructions used in privacy-en
- PDF / 10,554,411 Bytes
- 407 Pages / 439.37 x 666.142 pts Page_size
- 36 Downloads / 169 Views
Joaquin Garcia-Alfaro · Georgios Lioudakis Nora Cuppens-Boulahia · Simon Foley William M. Fitzgerald (Eds.)
Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013 Egham, UK, September 12–13, 2013 Revised Selected Papers
123
Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Zürich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany
For further volumes: http://www.springer.com/series/7410
8247
Joaquin Garcia-Alfaro Georgios Lioudakis Nora Cuppens-Boulahia Simon Foley William M. Fitzgerald (Eds.) •
•
Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013 Egham, UK, September 12–13, 2013 Revised Selected Papers
123
Editors Joaquin Garcia-Alfaro Telecom SudParis Evry France
Simon Foley University College Cork Cork Ireland
Georgios Lioudakis National Technical University of Athens Athens Greece Nora Cuppens-Boulahia Telecom Bretagne Cesson Sévigné France
ISSN 0302-9743 ISBN 978-3-642-54567-2 DOI 10.1007/978-3-642-54568-9
William M. Fitzgerald IDA Ovens EMC Information Systems International Cork Ireland
ISSN 1611-3349 (electronic) ISBN 978-3-642-54568-9 (eBook)
Springer Heidelberg New York Dordrecht London Library of Congress Control Number: 2014934122 LNCS Sublibrary: SL4 – Security and Cryptology Springer-Verlag Berlin Heidelberg 2014 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts t
Data Loading...