Cargando…

Financial Cryptography and Data Security FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers /

This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Sion, Radu (Editor ), Curtmola, Reza (Editor ), Dietrich, Sven (Editor ), Kiayias, Aggelos (Editor ), Miret, Josep M. (Editor ), Sako, Kazue (Editor ), Sebé, Francesc (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6054
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • WLC Preface
  • Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
  • Lighten Encryption Schemes for Secure and Private RFID Systems
  • Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags
  • A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results
  • Reliable Food Traceability Using RFID Tagging
  • Lightweight Cryptography and DPA Countermeasures: A Survey
  • Securing the Use of RFID-Enabled Banknotes
  • Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports
  • RLCPS Preface
  • SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications
  • A Secure and Privacy-Preserving Targeted Ad-System
  • Cryptographic Cloud Storage
  • Extending IPsec for Efficient Remote Attestation
  • Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions
  • How to Evaluate the Security of Real-Life Cryptographic Protocols?
  • WECSR Preface
  • Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals
  • A Case Study on Measuring Statistical Data in the Tor Anonymity Network
  • A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
  • Ethical Proactive Threat Research
  • A Framework for Understanding and Applying Ethical Principles in Network and Security Research
  • Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects
  • Ethical Guidelines for Computer Security Researchers: "Be Reasonable".