FC 2011 Workshops, RLCPS and WECSR, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers Herausgegeben:Danezis, George; Dietrich, Sven; Sako, Kazue
FC 2011 Workshops, RLCPS and WECSR, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers Herausgegeben:Danezis, George; Dietrich, Sven; Sako, Kazue
This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011.The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial…mehr
This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011.The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Sven Dietrich, geboren 1969 in Reichenbach im Vogtland, ist gelernter Rechtsanwalt und hatte von 2001 bis 2008 das Amt des Bürgermeisters für Umwelt und Ordnung der Stadt Zwickau inne.
Inhaltsangabe
Financial Cryptography and Data Security
Workshops.-Real-Life Cryptographic Protocols and
Standardization.-Cryptographic Protocols: From the Abstract to the Practical to the
Actual (Invited Talk).-Toward Real-Life Implementation of Signature Schemes from the Strong RSA Assumption.-Detailed Cost Estimation of CNTW Attack against EMV Signature Scheme.-Fast Elliptic Curve Cryptography in OpenSSL.-Cryptographic Treatment of Private User Profiles.-An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems.-A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID
Authentication.-Biometric Transaction Authentication Protocol: Formal Model
Verification and "Four-Eyes" Principle Extension.-Exploration and Field Study of a Password Manager Using Icon-Based Passwords.-Workshop on Ethics in Computer Security Research Ethical Issues in E-Voting Security Analysis (Invited Talk) .-Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent.-Human Subjects, Agents, or Bots: Current Issues in Ethics and
Computer Security Research (Panel Statements).-Enforced Community Standards for Research on Users of the Tor Anonymity Network (Invited Talk).-Ethical Dilemmas in Take-Down Research.-Ethical Considerations of Sharing Data for Cybersecurity Research.-Moving Forward, Building an Ethics Community (Panel Statements).-
Standardization.-Cryptographic Protocols: From the Abstract to the Practical to the
Actual (Invited Talk).-Toward Real-Life Implementation of Signature Schemes from the Strong RSA Assumption.-Detailed Cost Estimation of CNTW Attack against EMV Signature Scheme.-Fast Elliptic Curve Cryptography in OpenSSL.-Cryptographic Treatment of Private User Profiles.-An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems.-A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID
Authentication.-Biometric Transaction Authentication Protocol: Formal Model
Verification and "Four-Eyes" Principle Extension.-Exploration and Field Study of a Password Manager Using Icon-Based Passwords.-Workshop on Ethics in Computer Security Research Ethical Issues in E-Voting Security Analysis (Invited Talk) .-Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent.-Human Subjects, Agents, or Bots: Current Issues in Ethics and
Computer Security Research (Panel Statements).-Enforced Community Standards for Research on Users of the Tor Anonymity Network (Invited Talk).-Ethical Dilemmas in Take-Down Research.-Ethical Considerations of Sharing Data for Cybersecurity Research.-Moving Forward, Building an Ethics Community (Panel Statements).-
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG i.I. Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309