Financial Cryptography and Data Security FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers /
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, a...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
6054 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- WLC Preface
- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
- Lighten Encryption Schemes for Secure and Private RFID Systems
- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags
- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results
- Reliable Food Traceability Using RFID Tagging
- Lightweight Cryptography and DPA Countermeasures: A Survey
- Securing the Use of RFID-Enabled Banknotes
- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports
- RLCPS Preface
- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications
- A Secure and Privacy-Preserving Targeted Ad-System
- Cryptographic Cloud Storage
- Extending IPsec for Efficient Remote Attestation
- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions
- How to Evaluate the Security of Real-Life Cryptographic Protocols?
- WECSR Preface
- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals
- A Case Study on Measuring Statistical Data in the Tor Anonymity Network
- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
- Ethical Proactive Threat Research
- A Framework for Understanding and Applying Ethical Principles in Network and Security Research
- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects
- Ethical Guidelines for Computer Security Researchers: "Be Reasonable".