Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the ?rst year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance.

Author(s): Josep M. Miret, Francesc Sebé (auth.), Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé (eds.)
Series: Lecture Notes in Computer Science 6054 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 256
Tags: Computer Communication Networks; e-Commerce/e-business; Management of Computing and Information Systems; Data Encryption; Computers and Society; Information Systems Applications (incl.Internet)

Front Matter....Pages -
WLC Preface....Pages 1-1
Hummingbird : Ultra-Lightweight Cryptography for Resource-Constrained Devices....Pages 3-18
Lighten Encryption Schemes for Secure and Private RFID Systems....Pages 19-33
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags....Pages 34-46
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results....Pages 47-56
Reliable Food Traceability Using RFID Tagging....Pages 57-67
Lightweight Cryptography and DPA Countermeasures: A Survey....Pages 68-79
Securing the Use of RFID-Enabled Banknotes....Pages 80-93
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports....Pages 94-104
RLCPS Preface....Pages 105-105
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications....Pages 107-122
A Secure and Privacy-Preserving Targeted Ad-System....Pages 123-135
Cryptographic Cloud Storage....Pages 136-149
Extending IPsec for Efficient Remote Attestation....Pages 150-165
Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions....Pages 166-181
How to Evaluate the Security of Real-Life Cryptographic Protocols?....Pages 182-194
WECSR Preface....Pages 195-195
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals....Pages 197-202
A Case Study on Measuring Statistical Data in the Tor Anonymity Network....Pages 203-215
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets....Pages 216-230
Ethical Proactive Threat Research....Pages 231-239
A Framework for Understanding and Applying Ethical Principles in Network and Security Research....Pages 240-246
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects....Pages 247-249
Ethical Guidelines for Computer Security Researchers: “Be Reasonable”....Pages 250-255
Back Matter....Pages -