Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / Edition 1

Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / Edition 1

ISBN-10:
364214991X
ISBN-13:
9783642149917
Pub. Date:
10/14/2010
Publisher:
Springer Berlin Heidelberg
ISBN-10:
364214991X
ISBN-13:
9783642149917
Pub. Date:
10/14/2010
Publisher:
Springer Berlin Heidelberg
Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / Edition 1

Financial Cryptography and Data Security: FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / Edition 1

Hardcover

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life Cryptographic Prools and Standardization (RLCPS), the Workshop on Ethics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the first year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance.

Product Details

ISBN-13: 9783642149917
Publisher: Springer Berlin Heidelberg
Publication date: 10/14/2010
Series: Lecture Notes in Computer Science , #6054
Edition description: 2010
Pages: 257
Product dimensions: 6.10(w) x 9.30(h) x 0.60(d)

Table of Contents

WLC Preface Josep M. Miret Francesc Sebé 1

Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices Daniel Engels Xinxin Fan Guang Gong Honggang Hu Eric M. Smith 3

Lighten Encryption Schemes for Secure and Private RFID Systems Sébastien Canard Iwen Coisel Jonathan Etrog 19

Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags J. Melia-Segui J. Garcia-Alfaro J. Herrera-Joancomarti 34

A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results Jin Tamura Kazukuni Kobara Hanane Fathi Hideki Imai 47

Reliable Food Traceability Using RFID Tagging Guillermo Azuara José L. Salazar José L. Tornos Joan J. Piles 57

Lightweight Cryptography and DPA Countermeasures: A Survey Amir Moradi Axel Poschmann 68

Securing the Use of RFID-Enabled Banknotes Santi Martínez Concepció Roig Magda Valls 80

Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports Vincenzo Auletta Carlo Blundo Angelo De Caro Emiliano De Cristofaro Giuseppe Persiano Ivan Visconti 94

RLCPS Preface Aggelos Kiayias Kazue Sako 105

SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications Jean-Sébastien Coron Aline Gouget Pascal Paillier Karine Villegas 107

A Secure and Privacy-Preserving Targeted Ad-System Elli Androulaki Steven M. Bellovin 123

Cryptographic Cloud Storage Seny Kamara Kristin Lauter 136

Extending IPsec for Efficient Remote Attestation Ahmad-Reza Sadeghi Steffen Schulz 150

Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions David William Kravitz 166

How to Evaluate the Security of Real-Life Cryptographic Protocols" The Cases of ISO/IEC 29128 and CRYPTREC Shin'ichiro Matsuo Kunihiko Miyazaki Akira Otsuka David Basin 182

WECSR Preface Sven Dietrich 195

Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals (Keynote Talk) Kenneth R. Fleischmann 197

A Case Study on Measuring Statistical Data in the Tor Anonymity Network Karsten Loesing Steven J. Murdoch Roger Dingledine 203

A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets David Dittrich Felix Leder Tillmann Werner 216

Ethical Proactive Threat Research (Position Paper) John Aycock John Sullins 231

A Framework for Understanding and Applying Ethical Principles in Network and Security Research (Position Paper) Erin Kenneally Michael Bailey Douglas Maughan 240

Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects (Panel) Lorrie Faith Cranor 247

Ethical Guidelines for Computer Security Researchers: "Be Reasonable" (Panel) Len Sassaman 250

Author Index 257

From the B&N Reads Blog

Customer Reviews