Amazon cover image
Image from Amazon.com

Financial cryptography and data security : FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28-March 4, 2011 : revised selected papers / George Danezis, Sven Dietrich, Kazue Sako (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 7126. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2012.Description: 1 online resource (xii, 183 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642298899
  • 3642298893
  • 3642298885
  • 9783642298882
Other title:
  • FC 2011 Workshops
  • RLCPS 2011
  • WECSR 2011
Subject(s): Genre/Form: Additional physical formats: Print version:: Financial cryptography and data security.DDC classification:
  • 005.8/2 23
LOC classification:
  • QA76.9.A25 R53 2011eb
Online resources:
Contents:
Cryptographic Protocols: From the Abstract to the Practical to the Actual / Moti Yung -- Toward Real-Life Implementation of Signature Schemes from the Strong RSA Assumption / Ping Yu and Rui Xue -- Detailed Cost Estimation of CNTW Attack against EMV Signature Scheme / Tetsuya Izu, Yoshitaka Morikawa, Yasuyuki Nogami, Yumi Sakemi and Masahiko Takenaka -- Fast Elliptic Curve Cryptography in OpenSSL / Emilia Käsper -- Cryptographic Treatment of Private User Profiles / Felix Günther, Mark Manulis and Thorsten Strufe -- An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems / Jennia Hizver and Tzi-cker Chiueh -- A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication / Yoshikazu HanataniI, Miyako Ohkubo, Shin'ichiro Matsuo, Kazuo Sakiyama and Kazuo Ohta -- Biometric Transaction Authentication Protocol: Formal Model Verification and "Four-Eyes" Principle Extension / Daniel Hartung and Christoph Busch -- Exploration and Field Study of a Password Manager Using Icon-Based Passwords / Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel and P.C. van Oorschot -- Ethical Issues in E-Voting Security Analysis / David G. Robinson and J. Alex Halderman -- Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent / Maritza L. Johnson, Steven M. Bellovin and Angelos D. Keromytis -- Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research / John Aycock, Elizabeth Buchanan, Scott Dexter and David Dittrich -- Enforced Community Standards for Research on Users of the Tor Anonymity Network / Christopher Soghoian -- Ethical Dilemmas in Take-Down Research / Tyler Moore and Richard Clayton -- Ethical Considerations of Sharing Data for Cybersecurity Research / Darren Shou -- Moving Forward, Building an Ethics Community (Panel Statements) / Erin Kenneally, Angelos Stavrou, John McHugh and Nicolas Christin.
Summary: Annotation This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011. The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes bibliographical references and author index.

Cryptographic Protocols: From the Abstract to the Practical to the Actual / Moti Yung -- Toward Real-Life Implementation of Signature Schemes from the Strong RSA Assumption / Ping Yu and Rui Xue -- Detailed Cost Estimation of CNTW Attack against EMV Signature Scheme / Tetsuya Izu, Yoshitaka Morikawa, Yasuyuki Nogami, Yumi Sakemi and Masahiko Takenaka -- Fast Elliptic Curve Cryptography in OpenSSL / Emilia Käsper -- Cryptographic Treatment of Private User Profiles / Felix Günther, Mark Manulis and Thorsten Strufe -- An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems / Jennia Hizver and Tzi-cker Chiueh -- A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication / Yoshikazu HanataniI, Miyako Ohkubo, Shin'ichiro Matsuo, Kazuo Sakiyama and Kazuo Ohta -- Biometric Transaction Authentication Protocol: Formal Model Verification and "Four-Eyes" Principle Extension / Daniel Hartung and Christoph Busch -- Exploration and Field Study of a Password Manager Using Icon-Based Passwords / Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel and P.C. van Oorschot -- Ethical Issues in E-Voting Security Analysis / David G. Robinson and J. Alex Halderman -- Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent / Maritza L. Johnson, Steven M. Bellovin and Angelos D. Keromytis -- Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research / John Aycock, Elizabeth Buchanan, Scott Dexter and David Dittrich -- Enforced Community Standards for Research on Users of the Tor Anonymity Network / Christopher Soghoian -- Ethical Dilemmas in Take-Down Research / Tyler Moore and Richard Clayton -- Ethical Considerations of Sharing Data for Cybersecurity Research / Darren Shou -- Moving Forward, Building an Ethics Community (Panel Statements) / Erin Kenneally, Angelos Stavrou, John McHugh and Nicolas Christin.

Annotation This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011. The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management.

Powered by Koha