Financial Cryptography and Data Security [[electronic resource] ] : 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XII, 432p. 77 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Cryptology |
ISBN |
1-280-38809-9
9786613566010 3-642-14577-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Constructive Cryptography – A Primer -- Security Mechanisms with Selfish Players in Wireless Networks -- Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory -- Multichannel Protocols to Prevent Relay Attacks -- A Traceability Attack against e-Passports -- Secure Computation with Fixed-Point Numbers -- Implementing a High-Assurance Smart-Card OS -- Unlinkable Priced Oblivious Transfer with Rechargeable Wallets -- Multiple Denominations in E-cash with Compact Transaction Data -- What’s in a Name? -- Cryptographic Protocol Analysis of AN.ON -- A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys -- Practical Private Set Intersection Protocols with Linear Complexity -- Design and Implementation of a Key-Lifecycle Management System -- Measuring the Perpetrators and Funders of Typosquatting -- A Learning-Based Approach to Reactive Security -- Embedded SFE: Offloading Server and Network Using Hardware Tokens -- The Phish-Market Protocol: Securely Sharing Attack Data between Competitors -- Building Incentives into Tor -- Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections -- Automatically Preparing Safe SQL Queries -- PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure -- Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy -- Designing for Audit: A Voting Machine with a Tiny TCB -- Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits -- Security Applications of Diodes with Unique Current-Voltage Characteristics -- Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication -- All You Can Eat or Breaking a Real-World Contactless Payment System -- Shoulder-Surfing Safe Login in a Partially Observable Attacker Model -- Using Sphinx to Improve Onion Routing Circuit Construction -- Secure Multiparty AES -- Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis -- On Robust Key Agreement Based on Public Key Authentication -- A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing -- Signatures of Reputation -- Intention-Disguised Algorithmic Trading -- When Information Improves Information Security -- BetterThanPin: Empowering Users to Fight Phishing (Poster) -- Certification Intermediaries and the Alternative (Poster) -- SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs -- Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks -- Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols -- hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers. |
Record Nr. | UNISA-996465789603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Financial Cryptography and Data Security [[electronic resource] ] : FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / / edited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, Kazue Sako, Francesc Sebé |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XII, 256 p.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Computer engineering E-commerce Management information systems Computer science Computers and civilization Computer Communication Networks Cryptology Computer Engineering e-Commerce/e-business Management of Computing and Information Systems Computers and Society |
Soggetto genere / forma |
Conference proceedings.
Kongress |
ISBN | 3-642-14992-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | WLC Preface -- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices -- Lighten Encryption Schemes for Secure and Private RFID Systems -- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags -- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results -- Reliable Food Traceability Using RFID Tagging -- Lightweight Cryptography and DPA Countermeasures: A Survey -- Securing the Use of RFID-Enabled Banknotes -- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports -- RLCPS Preface -- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications -- A Secure and Privacy-Preserving Targeted Ad-System -- Cryptographic Cloud Storage -- Extending IPsec for Efficient Remote Attestation -- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions -- How to Evaluate the Security of Real-Life Cryptographic Protocols? -- WECSR Preface -- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network -- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets -- Ethical Proactive Threat Research -- A Framework for Understanding and Applying Ethical Principles in Network and Security Research -- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects -- Ethical Guidelines for Computer Security Researchers: “Be Reasonable”. |
Record Nr. | UNISA-996466280603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Financial cryptography and data security : FC 2010 workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010 : revised selected papers / / Radu Sion ... [et al.], (eds.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, 2010 |
Descrizione fisica | 1 online resource (XII, 256 p.) |
Disciplina | 004.6 |
Altri autori (Persone) | SionRadu |
Collana | Lecture notes in computer science |
Soggetto topico |
Electronic funds transfers - Security measures
Data encryption (Computer science) Electronic commerce - Security measures Computer networks - Security measures |
ISBN | 3-642-14992-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | WLC Preface -- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices -- Lighten Encryption Schemes for Secure and Private RFID Systems -- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags -- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results -- Reliable Food Traceability Using RFID Tagging -- Lightweight Cryptography and DPA Countermeasures: A Survey -- Securing the Use of RFID-Enabled Banknotes -- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports -- RLCPS Preface -- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications -- A Secure and Privacy-Preserving Targeted Ad-System -- Cryptographic Cloud Storage -- Extending IPsec for Efficient Remote Attestation -- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions -- How to Evaluate the Security of Real-Life Cryptographic Protocols? -- WECSR Preface -- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network -- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets -- Ethical Proactive Threat Research -- A Framework for Understanding and Applying Ethical Principles in Network and Security Research -- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects -- Ethical Guidelines for Computer Security Researchers: “Be Reasonable”. |
Altri titoli varianti | FC 2010 workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010 |
Record Nr. | UNINA-9910483448603321 |
Berlin ; ; New York, : Springer, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Financial cryptography and data security : 14th international conference, FC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010 ; revised selected papers / / Radu Sion (ed.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, : Springer, c2010 |
Descrizione fisica | 1 online resource (XII, 432p. 77 illus.) |
Disciplina | 332.178 |
Altri autori (Persone) | SionRadu |
Collana |
Lecture notes in computer science
LNCS sublibrary: SL 4 - Security and cryptology |
Soggetto topico |
Electronic funds transfers - Security measures
Data encryption (Computer science) Electronic commerce - Security measures Computer networks - Security measures Internet banking - Security measures |
ISBN |
1-280-38809-9
9786613566010 3-642-14577-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Constructive Cryptography – A Primer -- Security Mechanisms with Selfish Players in Wireless Networks -- Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory -- Multichannel Protocols to Prevent Relay Attacks -- A Traceability Attack against e-Passports -- Secure Computation with Fixed-Point Numbers -- Implementing a High-Assurance Smart-Card OS -- Unlinkable Priced Oblivious Transfer with Rechargeable Wallets -- Multiple Denominations in E-cash with Compact Transaction Data -- What’s in a Name? -- Cryptographic Protocol Analysis of AN.ON -- A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys -- Practical Private Set Intersection Protocols with Linear Complexity -- Design and Implementation of a Key-Lifecycle Management System -- Measuring the Perpetrators and Funders of Typosquatting -- A Learning-Based Approach to Reactive Security -- Embedded SFE: Offloading Server and Network Using Hardware Tokens -- The Phish-Market Protocol: Securely Sharing Attack Data between Competitors -- Building Incentives into Tor -- Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections -- Automatically Preparing Safe SQL Queries -- PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure -- Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy -- Designing for Audit: A Voting Machine with a Tiny TCB -- Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits -- Security Applications of Diodes with Unique Current-Voltage Characteristics -- Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication -- All You Can Eat or Breaking a Real-World Contactless Payment System -- Shoulder-Surfing Safe Login in a Partially Observable Attacker Model -- Using Sphinx to Improve Onion Routing Circuit Construction -- Secure Multiparty AES -- Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis -- On Robust Key Agreement Based on Public Key Authentication -- A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing -- Signatures of Reputation -- Intention-Disguised Algorithmic Trading -- When Information Improves Information Security -- BetterThanPin: Empowering Users to Fight Phishing (Poster) -- Certification Intermediaries and the Alternative (Poster) -- SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs -- Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks -- Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols -- hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers. |
Record Nr. | UNINA-9910484260903321 |
Berlin, : Springer, c2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 2009 Acm Workshop on Cloud Computing Security |
Pubbl/distr/stampa | [Place of publication not identified] : , : Association for Computing Machinery, , 2009 |
Descrizione fisica | 1 online resource (144 pages) |
Collana | ACM Conferences. |
Soggetto topico | Information Technology - Computer Science (Hardware & Networks) |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | CCSW '09 |
Record Nr. | UNINA-9910376065503321 |
[Place of publication not identified] : , : Association for Computing Machinery, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2010 |
Descrizione fisica | 1 online resource (110 pages) |
Collana | ACM Conferences |
Soggetto topico |
Electrical & Computer Engineering
Engineering & Applied Sciences Telecommunications |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | CCSW '10 |
Record Nr. | UNINA-9910376005103321 |
[Place of publication not identified], : ACM, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop : November 9, 2020, Virtual Event, USA / / Yinqian Zhang, Radu Sion |
Autore | Zhang Yinqian |
Pubbl/distr/stampa | New York : , : Association for Computing Machinery, , [2020] |
Descrizione fisica | 1 online resource (176 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico | Computer security |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910510476303321 |
Zhang Yinqian | ||
New York : , : Association for Computing Machinery, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|