000 -LEADER |
fixed length control field |
04581nam a22005775i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310144051.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100809s2010 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783642149924 |
|
978-3-642-14992-4 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.5-5105.9 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.6 |
Edition number |
23 |
264 #1 - |
-- |
Berlin, Heidelberg : |
-- |
Springer Berlin Heidelberg, |
-- |
2010. |
912 ## - |
-- |
ZDB-2-SCS |
|
-- |
ZDB-2-LNC |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Sion, Radu. |
Relator term |
editor. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Financial Cryptography and Data Security |
Medium |
[electronic resource] : |
Remainder of title |
FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers / |
Statement of responsibility, etc |
edited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
X, 257p. 33 illus. |
Other physical details |
online resource. |
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Lecture Notes in Computer Science, |
International Standard Serial Number |
0302-9743 ; |
Volume number/sequential designation |
6054 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
WLC Preface -- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices -- Lighten Encryption Schemes for Secure and Private RFID Systems -- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags -- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results -- Reliable Food Traceability Using RFID Tagging -- Lightweight Cryptography and DPA Countermeasures: A Survey -- Securing the Use of RFID-Enabled Banknotes -- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports -- RLCPS Preface -- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications -- A Secure and Privacy-Preserving Targeted Ad-System -- Cryptographic Cloud Storage -- Extending IPsec for Efficient Remote Attestation -- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions -- How to Evaluate the Security of Real-Life Cryptographic Protocols? -- WECSR Preface -- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network -- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets -- Ethical Proactive Threat Research -- A Framework for Understanding and Applying Ethical Principles in Network and Security Research -- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects -- Ethical Guidelines for Computer Security Researchers: “Be Reasonable”. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book contains the revised selected papers of the First Workshop on Lightweight Cryptography for Resource-Constrained Devices, WLC 2010, the First Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2010, and the First Workshop on Ethics in Computer Security Research, WECSR 2010, held in conjunction with the 14th International Conference on Financial Cryptography and Data Security, FC 2010, in Tenerife, Canary Islands, Spain, in January 2010. The 21 selected papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from low-cost cryptography and real-life issues discussing design criteria and relevant implementation challenges to ethical concerns and standards in the computer security research. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
|
Topical term or geographic name as entry element |
Data encryption (Computer science). |
|
Topical term or geographic name as entry element |
Information systems. |
|
Topical term or geographic name as entry element |
Information Systems. |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Computer Communication Networks. |
|
Topical term or geographic name as entry element |
e-Commerce/e-business. |
|
Topical term or geographic name as entry element |
Management of Computing and Information Systems. |
|
Topical term or geographic name as entry element |
Data Encryption. |
|
Topical term or geographic name as entry element |
Computers and Society. |
|
Topical term or geographic name as entry element |
Information Systems Applications (incl.Internet). |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Curtmola, Reza. |
Relator term |
editor. |
|
Personal name |
Dietrich, Sven. |
Relator term |
editor. |
|
Personal name |
Kiayias, Aggelos. |
Relator term |
editor. |
|
Personal name |
Miret, Josep M. |
Relator term |
editor. |
|
Personal name |
Sako, Kazue. |
Relator term |
editor. |
|
Personal name |
Sebé, Francesc. |
Relator term |
editor. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783642149917 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-3-642-14992-4 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |