000 04740nam a22006135i 4500
001 978-3-642-14992-4
003 DE-He213
005 20140220084544.0
007 cr nn 008mamaa
008 100809s2010 gw | s |||| 0|eng d
020 _a9783642149924
_9978-3-642-14992-4
024 7 _a10.1007/978-3-642-14992-4
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
100 1 _aSion, Radu.
_eeditor.
245 1 0 _aFinancial Cryptography and Data Security
_h[electronic resource] :
_bFC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers /
_cedited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aX, 257p. 33 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6054
505 0 _aWLC Preface -- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices -- Lighten Encryption Schemes for Secure and Private RFID Systems -- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags -- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results -- Reliable Food Traceability Using RFID Tagging -- Lightweight Cryptography and DPA Countermeasures: A Survey -- Securing the Use of RFID-Enabled Banknotes -- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports -- RLCPS Preface -- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications -- A Secure and Privacy-Preserving Targeted Ad-System -- Cryptographic Cloud Storage -- Extending IPsec for Efficient Remote Attestation -- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions -- How to Evaluate the Security of Real-Life Cryptographic Protocols? -- WECSR Preface -- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network -- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets -- Ethical Proactive Threat Research -- A Framework for Understanding and Applying Ethical Principles in Network and Security Research -- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects -- Ethical Guidelines for Computer Security Researchers: “Be Reasonable”.
520 _aThis book contains the revised selected papers of the First Workshop on Lightweight Cryptography for Resource-Constrained Devices, WLC 2010, the First Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2010, and the First Workshop on Ethics in Computer Security Research, WECSR 2010, held in conjunction with the 14th International Conference on Financial Cryptography and Data Security, FC 2010, in Tenerife, Canary Islands, Spain, in January 2010. The 21 selected papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from low-cost cryptography and real-life issues discussing design criteria and relevant implementation challenges to ethical concerns and standards in the computer security research.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData encryption (Computer science).
650 0 _aInformation systems.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _ae-Commerce/e-business.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aData Encryption.
650 2 4 _aComputers and Society.
650 2 4 _aInformation Systems Applications (incl.Internet).
700 1 _aCurtmola, Reza.
_eeditor.
700 1 _aDietrich, Sven.
_eeditor.
700 1 _aKiayias, Aggelos.
_eeditor.
700 1 _aMiret, Josep M.
_eeditor.
700 1 _aSako, Kazue.
_eeditor.
700 1 _aSebé, Francesc.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642149917
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6054
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-14992-4
912 _aZDB-2-SCS
912 _aZDB-2-LNC
999 _c112568
_d112568