Get Free Shipping on orders over $79
Financial Cryptography and Data Security : FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers - Aggelos Kiayias

Financial Cryptography and Data Security

FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers

By: Aggelos Kiayias (Editor), Sven Dietrich (Editor), Reza Curtmola (Editor), Radu Sion (Editor), Kazue Sako (Editor)

Hardcover | 10 August 2010

At a Glance

Hardcover


$84.99

or 4 interest-free payments of $21.25 with

 or 

Ships in 5 to 7 business days

WLC Preface.- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices.- Lighten Encryption Schemes for Secure and Private RFID Systems.- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags.- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results.- Reliable Food Traceability Using RFID Tagging.- Lightweight Cryptography and DPA Countermeasures: A Survey.- Securing the Use of RFID-Enabled Banknotes.- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.- RLCPS Preface.- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications.- A Secure and Privacy-Preserving Targeted Ad-System.- Cryptographic Cloud Storage.- Extending IPsec for Efficient Remote Attestation.- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions.- How to Evaluate the Security of Real-Life Cryptographic Protocols?.- WECSR Preface.- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals.- A Case Study on Measuring Statistical Data in the Tor Anonymity Network.- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets.- Ethical Proactive Threat Research.- A Framework for Understanding and Applying Ethical Principles in Network and Security Research.- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects.- Ethical Guidelines for Computer Security Researchers: "Be Reasonable".

More in Coding Theory & Cryptology

New Storytelling : Learning through Metaphors - Anna Ursyn

RRP $103.00

$91.75

11%
OFF
Introduction to Modern Cryptography : Revised Third Edition - Jonathan  Katz
Unveiling the Art of Steganography : A Modern Approach - Manoj Kumar