LEADER 07320nam 22009375 450 001 996466280603316 005 20200703211221.0 010 $a3-642-14992-8 024 7 $a10.1007/978-3-642-14992-4 035 $a(CKB)2670000000036371 035 $a(SSID)ssj0000446467 035 $a(PQKBManifestationID)11297676 035 $a(PQKBTitleCode)TC0000446467 035 $a(PQKBWorkID)10496160 035 $a(PQKB)11777888 035 $a(DE-He213)978-3-642-14992-4 035 $a(MiAaPQ)EBC3065621 035 $a(PPN)14901855X 035 $a(EXLCZ)992670000000036371 100 $a20100809d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFinancial Cryptography and Data Security$b[electronic resource] $eFC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers /$fedited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, Kazue Sako, Francesc Sebé 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XII, 256 p.) 225 1 $aSecurity and Cryptology ;$v6054 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-14991-X 320 $aIncludes bibliographical references and index. 327 $aWLC Preface -- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices -- Lighten Encryption Schemes for Secure and Private RFID Systems -- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags -- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results -- Reliable Food Traceability Using RFID Tagging -- Lightweight Cryptography and DPA Countermeasures: A Survey -- Securing the Use of RFID-Enabled Banknotes -- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports -- RLCPS Preface -- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications -- A Secure and Privacy-Preserving Targeted Ad-System -- Cryptographic Cloud Storage -- Extending IPsec for Efficient Remote Attestation -- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions -- How to Evaluate the Security of Real-Life Cryptographic Protocols? -- WECSR Preface -- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network -- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets -- Ethical Proactive Threat Research -- A Framework for Understanding and Applying Ethical Principles in Network and Security Research -- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects -- Ethical Guidelines for Computer Security Researchers: ?Be Reasonable?. 330 $aThis volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the ?rst year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance. 410 0$aSecurity and Cryptology ;$v6054 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aComputer engineering 606 $aE-commerce 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I27000 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 607 $aTeneriffa <2010>$2swd 608 $aConference proceedings.$2fast 608 $aKongress$2swd 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aComputer engineering. 615 0$aE-commerce. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aComputer Engineering. 615 24$ae-Commerce/e-business. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 676 $a004.6 702 $aSion$b Radu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCurtmola$b Reza$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDietrich$b Sven$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKiayias$b Aggelos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMiret$b Josep M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSako$b Kazue$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSebé$b Francesc$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aFC (Conference)$d(14th :$f2010 :$eTenerife, Canary Islands) 712 12$aWorkshop on Real-Life Cryptographic Protocols and Standardization$f(2010 :$eTenerife, Canary Islands) 712 12$aWorkshop on Ethics in Computer Security Research$f(2010 :$eTenerife, Canary Islands) 712 12$aWorkshop on Lightweight Cryptography for Resource-Constrained Devices$f(2010 :$eTenerife, Canary Islands) 906 $aBOOK 912 $a996466280603316 996 $aFinancial Cryptography and Data Security$9772196 997 $aUNISA