default search action
14th Financial Cryptography 2010: Tenerife, Canary Islands, Spain - Workshops
- Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé:
Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6054, Springer 2010, ISBN 978-3-642-14991-7 - Josep M. Miret, Francesc Sebé:
WLC Preface. 1 - Daniel W. Engels, Xinxin Fan, Guang Gong, Honggang Hu, Eric M. Smith:
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. 3-18 - Sébastien Canard, Iwen Coisel, Jonathan Etrog:
Lighten Encryption Schemes for Secure and Private RFID Systems. 19-33 - Joan Melià-Seguí, Joaquín García-Alfaro, Jordi Herrera-Joancomartí:
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags. 34-46 - Jin Tamura, Kazukuni Kobara, Hanane Fathi, Hideki Imai:
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results. 47-56 - Guillermo Azuara, José Luis Salazar, José L. Tornos, Joan Josep Piles:
Reliable Food Traceability Using RFID Tagging. 57-67 - Amir Moradi, Axel Poschmann:
Lightweight Cryptography and DPA Countermeasures: A Survey. 68-79 - Santi Martínez, Concepció Roig, Magda Valls:
Securing the Use of RFID-Enabled Banknotes. 80-93 - Vincenzo Auletta, Carlo Blundo, Angelo De Caro, Emiliano De Cristofaro, Giuseppe Persiano, Ivan Visconti:
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports. 94-104 - Aggelos Kiayias, Kazue Sako:
RLCPS Preface. 105 - Jean-Sébastien Coron, Aline Gouget, Pascal Paillier, Karine Villegas:
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications. 107-122 - Elli Androulaki, Steven M. Bellovin:
A Secure and Privacy-Preserving Targeted Ad-System. 123-135 - Seny Kamara, Kristin E. Lauter:
Cryptographic Cloud Storage. 136-149 - Ahmad-Reza Sadeghi, Steffen Schulz:
Extending IPsec for Efficient Remote Attestation. 150-165 - David W. Kravitz:
Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions. 166-181 - Shin'ichiro Matsuo, Kunihiko Miyazaki, Akira Otsuka, David A. Basin:
How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC. 182-194 - Sven Dietrich:
WECSR Preface. 195 - Kenneth R. Fleischmann:
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals. 197-202 - Karsten Loesing, Steven J. Murdoch, Roger Dingledine:
A Case Study on Measuring Statistical Data in the Tor Anonymity Network. 203-215 - David Dittrich, Felix Leder, Tillmann Werner:
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets. 216-230 - John Aycock, John P. Sullins:
Ethical Proactive Threat Research. 231-239 - Erin Kenneally, Michael D. Bailey, Douglas Maughan:
A Framework for Understanding and Applying Ethical Principles in Network and Security Research. 240-246 - Lorrie Faith Cranor:
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects. 247-249 - Len Sassaman:
Ethical Guidelines for Computer Security Researchers: "Be Reasonable". 250-255
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.