Financial Cryptography and Data Security FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers /

This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, a...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Sion, Radu (Επιμελητής έκδοσης), Curtmola, Reza (Επιμελητής έκδοσης), Dietrich, Sven (Επιμελητής έκδοσης), Kiayias, Aggelos (Επιμελητής έκδοσης), Miret, Josep M. (Επιμελητής έκδοσης), Sako, Kazue (Επιμελητής έκδοσης), Sebé, Francesc (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6054
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • WLC Preface
  • Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
  • Lighten Encryption Schemes for Secure and Private RFID Systems
  • Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags
  • A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results
  • Reliable Food Traceability Using RFID Tagging
  • Lightweight Cryptography and DPA Countermeasures: A Survey
  • Securing the Use of RFID-Enabled Banknotes
  • Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports
  • RLCPS Preface
  • SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications
  • A Secure and Privacy-Preserving Targeted Ad-System
  • Cryptographic Cloud Storage
  • Extending IPsec for Efficient Remote Attestation
  • Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions
  • How to Evaluate the Security of Real-Life Cryptographic Protocols?
  • WECSR Preface
  • Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals
  • A Case Study on Measuring Statistical Data in the Tor Anonymity Network
  • A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
  • Ethical Proactive Threat Research
  • A Framework for Understanding and Applying Ethical Principles in Network and Security Research
  • Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects
  • Ethical Guidelines for Computer Security Researchers: “Be Reasonable”.