Financial Cryptography and Data Security: Fc 2011 Workshops, Rlcps and Wecsr, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers - Lecture Notes in Computer Science / Security and Cryptology - George Danezis - 書籍 - Springer-Verlag Berlin and Heidelberg Gm - 9783642298882 - 2012年5月11日
カバー画像とタイトルが一致しない場合、正しいのはタイトルです

Financial Cryptography and Data Security: Fc 2011 Workshops, Rlcps and Wecsr, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers - Lecture Notes in Computer Science / Security and Cryptology

George Danezis

価格
R$ 309,90
税抜

遠隔倉庫からの取り寄せ

発送予定日 年12月2日 - 年12月12日
クリスマスプレゼントは1月31日まで返品可能です
iMusicのウィッシュリストに追加

Jacket Description/Back: This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011. The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management. Table of Contents: Financial Cryptography and Data SecurityWorkshops.-Real-Life Cryptographic Protocols andStandardization.-Cryptographic Protocols: From the Abstract to the Practical to theActual (Invited Talk).-Toward Real-Life Implementation of Signature Schemes from the Strong RSA Assumption.-Detailed Cost Estimation of CNTW Attack against EMV Signature Scheme.-Fast Elliptic Curve Cryptography in OpenSSL.-Cryptographic Treatment of Private User Profiles.-An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems.-A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFIDAuthentication.-Biometric Transaction Authentication Protocol: Formal ModelVerification and Four-Eyes Principle Extension.-Exploration and Field Study of a Password Manager Using Icon-Based Passwords.-Workshop on Ethics in Computer Security Research Ethical Issues in E-Voting Security Analysis (Invited Talk) .-Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent.-Human Subjects, Agents, or Bots: Current Issues in Ethics andComputer Security Research (Panel Statements).-Enforced Community Standards for Research on Users of the Tor Anonymity Network (Invited Talk).-Ethical Dilemmas in Take-Down Research.-Ethical Considerations of Sharing Data for Cybersecurity Research.-Moving Forward, Building an Ethics Community (Panel Statements).-"

Contributor Bio:  Dietrich, Sven Dietrich is a member of the technical staff at the CERT Coordination Center, part of the Software Engineering Institute at Carnegie Mellon University, and is affiliated with Carnegie Mellon CyLab, a university-wide cyber security research and education initiative.


200 pages, 15 black & white illustrations, biography

メディア 書籍     Paperback Book   (ソフトカバーで背表紙を接着した本)
リリース済み 2012年5月11日
ISBN13 9783642298882
出版社 Springer-Verlag Berlin and Heidelberg Gm
ページ数 200
寸法 156 × 234 × 10 mm   ·   285 g
言語 ドイツ語  
編集者 Danezis, George
編集者 Dietrich, Sven
編集者 Sako, Kazue

すべて表示

George Danezisの他の作品を見る