WLC Preface | p. 1 |
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices | p. 3 |
Lighten Encryption Schemes for Secure and Private RFID Systems | p. 19 |
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags | p. 34 |
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results | p. 47 |
Reliable Food Traceability Using RFID Tagging | p. 57 |
Lightweight Cryptography and DPA Countermeasures: A Survey | p. 68 |
Securing the Use of RFID-Enabled Banknotes | p. 80 |
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports | p. 94 |
RLCPS Preface | p. 105 |
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications | p. 107 |
A Secure and Privacy-Preserving Targeted Ad-System | p. 123 |
Cryptographic Cloud Storage | p. 136 |
Extending IPsec for Efficient Remote Attestation | p. 150 |
Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions | p. 166 |
How to Evaluate the Security of Real-Life Cryptographic Protocols? The Cases of ISO/IEC 29128 and CRYPTREC | p. 182 |
WECSR Preface | p. 195 |
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals (Keynote Talk) | p. 197 |
A Case Study on Measuring Statistical Data in the Tor Anonymity Network | p. 203 |
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets | p. 216 |
Ethical Proactive Threat Research (Position Paper) | p. 231 |
A Framework for Understanding and Applying Ethical Principles in Network and Security Research (Position Paper) | p. 240 |
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects (Panel) | p. 247 |
Ethical Guidelines for Computer Security Researchers: "Be Reasonable" (Panel) | p. 250 |
Author Index | p. 257 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.