Financial Cryptography and Data Security FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers /

This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, a...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Sion, Radu (Editor), Curtmola, Reza (Editor), Dietrich, Sven (Editor), Kiayias, Aggelos (Editor), Miret, Josep M. (Editor), Sako, Kazue (Editor), Sebé, Francesc (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Series:Lecture Notes in Computer Science, 6054
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • WLC Preface
  • Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
  • Lighten Encryption Schemes for Secure and Private RFID Systems
  • Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags
  • A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results
  • Reliable Food Traceability Using RFID Tagging
  • Lightweight Cryptography and DPA Countermeasures: A Survey
  • Securing the Use of RFID-Enabled Banknotes
  • Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports
  • RLCPS Preface
  • SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications
  • A Secure and Privacy-Preserving Targeted Ad-System
  • Cryptographic Cloud Storage
  • Extending IPsec for Efficient Remote Attestation
  • Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions
  • How to Evaluate the Security of Real-Life Cryptographic Protocols?
  • WECSR Preface
  • Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals
  • A Case Study on Measuring Statistical Data in the Tor Anonymity Network
  • A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
  • Ethical Proactive Threat Research
  • A Framework for Understanding and Applying Ethical Principles in Network and Security Research
  • Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects
  • Ethical Guidelines for Computer Security Researchers: “Be Reasonable”.