Online Library TheLib.net » Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers
cover of the book Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers

Ebook: Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers

00
27.01.2024
0
0

This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011. The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management.




This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011.
The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management.


This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011.
The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management.
Content:
Front Matter....Pages -
Cryptographic Protocols: From the Abstract to the Practical to the Actual....Pages 1-2
Toward Real-Life Implementation of Signature Schemes from the Strong RSA Assumption....Pages 3-12
Detailed Cost Estimation of CNTW Attack against EMV Signature Scheme....Pages 13-26
Fast Elliptic Curve Cryptography in OpenSSL....Pages 27-39
Cryptographic Treatment of Private User Profiles....Pages 40-54
An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems....Pages 55-69
A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication....Pages 70-87
Biometric Transaction Authentication Protocol: Formal Model Verification and “Four-Eyes” Principle Extension....Pages 88-103
Exploration and Field Study of a Password Manager Using Icon-Based Passwords....Pages 104-118
Ethical Issues in E-Voting Security Analysis....Pages 119-130
Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent....Pages 131-137
Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research....Pages 138-145
Enforced Community Standards for Research on Users of the Tor Anonymity Network....Pages 146-153
Ethical Dilemmas in Take-Down Research....Pages 154-168
Ethical Considerations of Sharing Data for Cybersecurity Research....Pages 169-177
Moving Forward, Building an Ethics Community (Panel Statements)....Pages 178-183
Back Matter....Pages -


This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011.
The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management.
Content:
Front Matter....Pages -
Cryptographic Protocols: From the Abstract to the Practical to the Actual....Pages 1-2
Toward Real-Life Implementation of Signature Schemes from the Strong RSA Assumption....Pages 3-12
Detailed Cost Estimation of CNTW Attack against EMV Signature Scheme....Pages 13-26
Fast Elliptic Curve Cryptography in OpenSSL....Pages 27-39
Cryptographic Treatment of Private User Profiles....Pages 40-54
An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems....Pages 55-69
A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication....Pages 70-87
Biometric Transaction Authentication Protocol: Formal Model Verification and “Four-Eyes” Principle Extension....Pages 88-103
Exploration and Field Study of a Password Manager Using Icon-Based Passwords....Pages 104-118
Ethical Issues in E-Voting Security Analysis....Pages 119-130
Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent....Pages 131-137
Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research....Pages 138-145
Enforced Community Standards for Research on Users of the Tor Anonymity Network....Pages 146-153
Ethical Dilemmas in Take-Down Research....Pages 154-168
Ethical Considerations of Sharing Data for Cybersecurity Research....Pages 169-177
Moving Forward, Building an Ethics Community (Panel Statements)....Pages 178-183
Back Matter....Pages -
....
Download the book Financial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen