Financial Cryptography and Data Security
Springer Berlin (Verlag)
978-3-662-52003-1 (ISBN)
WLC Preface.- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices.- Lighten Encryption Schemes for Secure and Private RFID Systems.- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags.- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results.- Reliable Food Traceability Using RFID Tagging.- Lightweight Cryptography and DPA Countermeasures: A Survey.- Securing the Use of RFID-Enabled Banknotes.- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.- RLCPS Preface.- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications.- A Secure and Privacy-Preserving Targeted Ad-System.- Cryptographic Cloud Storage.- Extending IPsec for Efficient Remote Attestation.- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions.- How to Evaluate the Security of Real-Life Cryptographic Protocols?.- WECSR Preface.- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals.- A Case Study on Measuring Statistical Data in the Tor Anonymity Network.- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets.- Ethical Proactive Threat Research.- A Framework for Understanding and Applying Ethical Principles in Network and Security Research.- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects.- Ethical Guidelines for Computer Security Researchers: "Be Reasonable".
Erscheinungsdatum | 09.07.2016 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 257 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 415 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Office Programme ► Outlook | |
Mathematik / Informatik ► Informatik ► Theorie / Studium | |
Wirtschaft ► Betriebswirtschaft / Management | |
Schlagworte | botnets • computer ethics • cryptography • E-Commerce • e-government • ethics • Network Security • privacy • RFID • secure applications • security • tor network |
ISBN-10 | 3-662-52003-6 / 3662520036 |
ISBN-13 | 978-3-662-52003-1 / 9783662520031 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich