000 06130nam a22007095i 4500
001 978-3-642-14992-4
003 DE-He213
005 20240730185236.0
007 cr nn 008mamaa
008 100809s2010 gw | s |||| 0|eng d
020 _a9783642149924
_9978-3-642-14992-4
024 7 _a10.1007/978-3-642-14992-4
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aFinancial Cryptography and Data Security
_h[electronic resource] :
_bFC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers /
_cedited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, Kazue Sako, Francesc Sebé.
250 _a1st ed. 2010.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2010.
300 _aXII, 256 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v6054
505 0 _aWLC Preface -- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices -- Lighten Encryption Schemes for Secure and Private RFID Systems -- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags -- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results -- Reliable Food Traceability Using RFID Tagging -- Lightweight Cryptography and DPA Countermeasures: A Survey -- Securing the Use of RFID-Enabled Banknotes -- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports -- RLCPS Preface -- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications -- A Secure and Privacy-Preserving Targeted Ad-System -- Cryptographic Cloud Storage -- Extending IPsec for Efficient Remote Attestation -- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions -- How to Evaluate the Security of Real-Life Cryptographic Protocols? -- WECSR Preface -- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network -- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets -- Ethical Proactive Threat Research -- A Framework for Understanding and Applying Ethical Principles in Network and Security Research -- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects -- Ethical Guidelines for Computer Security Researchers: "Be Reasonable".
520 _aThis volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the ?rst year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance.
650 0 _aComputer networks .
_931572
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer engineering.
_910164
650 0 _aElectronic commerce.
_95589
650 0 _aElectronic data processing
_xManagement.
_9138488
650 0 _aComputers and civilization.
_921733
650 1 4 _aComputer Communication Networks.
_9138489
650 2 4 _aCryptology.
_931769
650 2 4 _aComputer Engineering and Networks.
_9138490
650 2 4 _ae-Commerce and e-Business.
_931772
650 2 4 _aIT Operations.
_931703
650 2 4 _aComputers and Society.
_931668
700 1 _aSion, Radu.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138491
700 1 _aCurtmola, Reza.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138492
700 1 _aDietrich, Sven.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138493
700 1 _aKiayias, Aggelos.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138494
700 1 _aMiret, Josep M.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138495
700 1 _aSako, Kazue.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138496
700 1 _aSebé, Francesc.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9138497
710 2 _aSpringerLink (Online service)
_9138498
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642149917
776 0 8 _iPrinted edition:
_z9783642149931
776 0 8 _iPrinted edition:
_z9783662520031
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v6054
_9138499
856 4 0 _uhttps://doi.org/10.1007/978-3-642-14992-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c92721
_d92721