rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783642149917

Financial Cryptography and Data Security

by ; ; ; ;
  • ISBN13:

    9783642149917

  • ISBN10:

    364214991X

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2010-10-30
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $89.99

Summary

This book contains the revised selected papers of the First Workshop on Lightweight Cryptography for Resource-Constrained Devices, WLC 2010, the First Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2010, and the First Workshop on Ethics in Computer Security Research, WECSR 2010, held in conjunction with the 14th International Conference on Financial Cryptography and Data Security, FC 2010, in Tenerife, Canary Islands, Spain, in January 2010. The 21 selected papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from low-cost cryptography and real-life issues discussing design criteria and relevant implementation challenges to ethical concerns and standards in the computer security research.

Table of Contents

WLC Prefacep. 1
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devicesp. 3
Lighten Encryption Schemes for Secure and Private RFID Systemsp. 19
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tagsp. 34
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Resultsp. 47
Reliable Food Traceability Using RFID Taggingp. 57
Lightweight Cryptography and DPA Countermeasures: A Surveyp. 68
Securing the Use of RFID-Enabled Banknotesp. 80
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passportsp. 94
RLCPS Prefacep. 105
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applicationsp. 107
A Secure and Privacy-Preserving Targeted Ad-Systemp. 123
Cryptographic Cloud Storagep. 136
Extending IPsec for Efficient Remote Attestationp. 150
Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictionsp. 166
How to Evaluate the Security of Real-Life Cryptographic Protocols? The Cases of ISO/IEC 29128 and CRYPTRECp. 182
WECSR Prefacep. 195
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals (Keynote Talk)p. 197
A Case Study on Measuring Statistical Data in the Tor Anonymity Networkp. 203
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnetsp. 216
Ethical Proactive Threat Research (Position Paper)p. 231
A Framework for Understanding and Applying Ethical Principles in Network and Security Research (Position Paper)p. 240
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects (Panel)p. 247
Ethical Guidelines for Computer Security Researchers: "Be Reasonable" (Panel)p. 250
Author Indexp. 257
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program