Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports (Englisch)
- Neue Suche nach: Auletta, V.
- Neue Suche nach: Blundo, C.
- Neue Suche nach: De Caro, A.
- Neue Suche nach: De Cristofaro, E.
- Neue Suche nach: Persiano, G.
- Neue Suche nach: Visconti, I.
- Neue Suche nach: Auletta, V.
- Neue Suche nach: Blundo, C.
- Neue Suche nach: De Caro, A.
- Neue Suche nach: De Cristofaro, E.
- Neue Suche nach: Persiano, G.
- Neue Suche nach: Visconti, I.
- Neue Suche nach: Sion, Radu
In:
Financial cryptography and data security
6054
;
94-104
;
2010
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports
-
Beteiligte:Auletta, V. ( Autor:in ) / Blundo, C. ( Autor:in ) / De Caro, A. ( Autor:in ) / De Cristofaro, E. ( Autor:in ) / Persiano, G. ( Autor:in ) / Visconti, I. ( Autor:in ) / Sion, Radu
-
Kongress:Conference; 14th, Financial cryptography and data security ; 2010 ; Tenerife, Spain
-
Erschienen in:Financial cryptography and data security , 6054 ; 94-104LECTURE NOTES IN COMPUTER SCIENCE , 6054 ; 94-104
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Berlin
-
Erscheinungsdatum:01.01.2010
-
Format / Umfang:11 pages
-
Anmerkungen:Based on those presented at the conference.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained DevicesEngels, D. / Fan, X. / Gong, G. / Hu, H. / Smith, E.M. et al. | 2010
- 19
-
Lighten Encryption Schemes for Secure and Private RFID SystemsCanard, S. / Coisel, I. / Etrog, J. et al. | 2010
- 34
-
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 TagsMelia-Segui, J. / Garcia-Alfaro, J. / Herrera-Joancomarti, J. et al. | 2010
- 47
-
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected ResultsTamura, J. / Kobara, K. / Fathi, H. / Imai, H. et al. | 2010
- 57
-
Reliable Food Traceability Using RFID TaggingAzuara, G. / Salazar, J.L. / Tornos, J.L. / Piles, J.J. et al. | 2010
- 68
-
Lightweight Cryptography and DPA Countermeasures: A SurveyMoradi, A. / Poschmann, A. et al. | 2010
- 80
-
Securing the Use of RFID-Enabled BanknotesMartinez, S. / Roig, C. / Valls, M. et al. | 2010
- 94
-
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-PassportsAuletta, V. / Blundo, C. / De Caro, A. / De Cristofaro, E. / Persiano, G. / Visconti, I. et al. | 2010
- 107
-
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less ApplicationsCoron, J.-S. / Gouget, A. / Paillier, P. / Villegas, K. et al. | 2010
- 123
-
A Secure and Privacy-Preserving Targeted Ad-SystemAndroulaki, E. / Bellovin, S.M. et al. | 2010
- 136
-
Cryptographic Cloud StorageKamara, S. / Lauter, K. et al. | 2010
- 150
-
Extending IPsec for Efficient Remote AttestationSadeghi, A.-R. / Schulz, S. et al. | 2010
- 166
-
Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM RestrictionsKravitz, D.W. et al. | 2010
- 182
-
How to Evaluate the Security of Real-Life Cryptographic Protocols? The Cases of ISO/IEC 29128 and CRYPTRECMatsuo, S. / Miyazaki, K. / Otsuka, A. / Basin, D. et al. | 2010
- 197
-
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals (Keynote Talk)Fleischmann, K.R. et al. | 2010
- 203
-
A Case Study on Measuring Statistical Data in the Tor Anonymity NetworkLoesing, K. / Murdoch, S.J. / Dingledine, R. et al. | 2010
- 216
-
A Case Study in Ethical Decision Making Regarding Remote Mitigation of BotnetsDittrich, D. / Leder, F. / Werner, T. et al. | 2010
- 231
-
Ethical Proactive Threat Research (Position Paper)Aycock, J. / Sullins, J. et al. | 2010
- 240
-
A Framework for Understanding and Applying Ethical Principles in Network and Security Research (Position Paper)Kenneally, E. / Bailey, M. / Maughan, D. et al. | 2010
- 247
-
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects (Panel)Cranor, L.F. et al. | 2010
- 250
-
Ethical Guidelines for Computer Security Researchers: ``Be Reasonable'' (Panel)Sassaman, L. et al. | 2010