


default search action
14th Financial Cryptography 2010: Tenerife, Canary Islands, Spain - Workshops
- Radu Sion

, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé:
Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6054, Springer 2010, ISBN 978-3-642-14991-7 - Josep M. Miret

, Francesc Sebé:
WLC Preface. 1 - Daniel W. Engels, Xinxin Fan, Guang Gong, Honggang Hu, Eric M. Smith:

Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. 3-18 - Sébastien Canard, Iwen Coisel, Jonathan Etrog:

Lighten Encryption Schemes for Secure and Private RFID Systems. 19-33 - Joan Melià-Seguí

, Joaquín García-Alfaro
, Jordi Herrera-Joancomartí
:
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags. 34-46 - Jin Tamura, Kazukuni Kobara, Hanane Fathi, Hideki Imai:

A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results. 47-56 - Guillermo Azuara

, José Luis Salazar, José L. Tornos, Joan Josep Piles:
Reliable Food Traceability Using RFID Tagging. 57-67 - Amir Moradi

, Axel Poschmann:
Lightweight Cryptography and DPA Countermeasures: A Survey. 68-79 - Santi Martínez

, Concepció Roig
, Magda Valls:
Securing the Use of RFID-Enabled Banknotes. 80-93 - Vincenzo Auletta

, Carlo Blundo
, Angelo De Caro, Emiliano De Cristofaro, Giuseppe Persiano, Ivan Visconti:
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports. 94-104 - Aggelos Kiayias, Kazue Sako:

RLCPS Preface. 105 - Jean-Sébastien Coron, Aline Gouget, Pascal Paillier, Karine Villegas:

SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications. 107-122 - Elli Androulaki, Steven M. Bellovin:

A Secure and Privacy-Preserving Targeted Ad-System. 123-135 - Seny Kamara, Kristin E. Lauter:

Cryptographic Cloud Storage. 136-149 - Ahmad-Reza Sadeghi, Steffen Schulz:

Extending IPsec for Efficient Remote Attestation. 150-165 - David W. Kravitz:

Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions. 166-181 - Shin'ichiro Matsuo, Kunihiko Miyazaki, Akira Otsuka, David A. Basin:

How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC. 182-194 - Sven Dietrich

:
WECSR Preface. 195 - Kenneth R. Fleischmann:

Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals. 197-202 - Karsten Loesing, Steven J. Murdoch

, Roger Dingledine:
A Case Study on Measuring Statistical Data in the Tor Anonymity Network. 203-215 - David Dittrich, Felix Leder, Tillmann Werner:

A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets. 216-230 - John Aycock, John P. Sullins:

Ethical Proactive Threat Research. 231-239 - Erin Kenneally, Michael D. Bailey, Douglas Maughan:

A Framework for Understanding and Applying Ethical Principles in Network and Security Research. 240-246 - Lorrie Faith Cranor

:
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects. 247-249 - Len Sassaman:

Ethical Guidelines for Computer Security Researchers: "Be Reasonable". 250-255

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














