Financial Cryptography and Data Security : FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers
Book Details
Format
Hardback or Cased Book
Book Series
Lecture Notes in Computer Science
ISBN-10
364214991X
ISBN-13
9783642149917
Publisher
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint
Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Country of Manufacture
GB
Country of Publication
GB
Publication Date
Aug 10th, 2010
Print length
257 Pages
Ksh 8,100.00
Werezi Extended Catalogue
Delivery in 28 days
Delivery Location
Delivery fee: Select location
Delivery in 28 days
Secure
Quality
Fast
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010.
WLC Preface.- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices.- Lighten Encryption Schemes for Secure and Private RFID Systems.- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags.- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results.- Reliable Food Traceability Using RFID Tagging.- Lightweight Cryptography and DPA Countermeasures: A Survey.- Securing the Use of RFID-Enabled Banknotes.- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.- RLCPS Preface.- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications.- A Secure and Privacy-Preserving Targeted Ad-System.- Cryptographic Cloud Storage.- Extending IPsec for Efficient Remote Attestation.- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions.- How to Evaluate the Security of Real-Life Cryptographic Protocols?.- WECSR Preface.- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals.- A Case Study on Measuring Statistical Data in the Tor Anonymity Network.- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets.- Ethical Proactive Threat Research.- A Framework for Understanding and Applying Ethical Principles in Network and Security Research.- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects.- Ethical Guidelines for Computer Security Researchers: "Be Reasonable".
Get Financial Cryptography and Data Security by at the best price and quality guaranteed only at Werezi Africa's largest book ecommerce store. The book was published by Springer-Verlag Berlin and Heidelberg GmbH & Co. KG and it has pages.