Financial Cryptography and Data Security

FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers

  • George Danezis
  • Sven Dietrich
  • Kazue Sako
Conference proceedings FC 2011

DOI: 10.1007/978-3-642-29889-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7126)

Table of contents (16 papers)

  1. Front Matter
  2. Financial Cryptography and Data Security Workshops

    1. Real-Life Cryptographic Protocols and Standardization

      1. Detailed Cost Estimation of CNTW Attack against EMV Signature Scheme
        Tetsuya Izu, Yoshitaka Morikawa, Yasuyuki Nogami, Yumi Sakemi, Masahiko Takenaka
        Pages 13-26
      2. Fast Elliptic Curve Cryptography in OpenSSL
        Emilia Käsper
        Pages 27-39
      3. Cryptographic Treatment of Private User Profiles
        Felix Günther, Mark Manulis, Thorsten Strufe
        Pages 40-54
      4. A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication
        Yoshikazu HanataniI, Miyako Ohkubo, Shin’ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta
        Pages 70-87
      5. Exploration and Field Study of a Password Manager Using Icon-Based Passwords
        Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, P. C. van Oorschot
        Pages 104-118
    2. Workshop on Ethics in Computer Security Research

      1. Ethical Issues in E-Voting Security Analysis
        David G. Robinson, J. Alex Halderman
        Pages 119-130
      2. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent
        Maritza L. Johnson, Steven M. Bellovin, Angelos D. Keromytis
        Pages 131-137
      3. Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research
        John Aycock, Elizabeth Buchanan, Scott Dexter, David Dittrich
        Pages 138-145
      4. Ethical Dilemmas in Take-Down Research
        Tyler Moore, Richard Clayton
        Pages 154-168
      5. Moving Forward, Building an Ethics Community (Panel Statements)
        Erin Kenneally, Angelos Stavrou, John McHugh, Nicolas Christin
        Pages 178-183
  3. Back Matter

Other volumes

  1. Financial Cryptography and Data Security
    15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers
  2. Financial Cryptography and Data Security
    FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers

About these proceedings

Introduction

This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011.
The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management.

Keywords

RFID biometric systems elliptic curve cryptography online banking security economics

Editors and affiliations

  • George Danezis
    • 1
  • Sven Dietrich
    • 2
  • Kazue Sako
    • 3
  1. 1.Microsoft Research CambridgeCambridgeUK
  2. 2.Department of Computer ScienceStevens Institute of TechnologyHobokenUSA
  3. 3.Central Research LaboratoriesNEC CorporationKawasakiJapan

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-29888-2
  • Online ISBN 978-3-642-29889-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349