Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports (English)
- New search for: Auletta, V.
- New search for: Blundo, C.
- New search for: De Caro, A.
- New search for: De Cristofaro, E.
- New search for: Persiano, G.
- New search for: Visconti, I.
- New search for: Auletta, V.
- New search for: Blundo, C.
- New search for: De Caro, A.
- New search for: De Cristofaro, E.
- New search for: Persiano, G.
- New search for: Visconti, I.
- New search for: Sion, Radu
In:
Financial cryptography and data security
6054
;
94-104
;
2010
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports
-
Contributors:Auletta, V. ( author ) / Blundo, C. ( author ) / De Caro, A. ( author ) / De Cristofaro, E. ( author ) / Persiano, G. ( author ) / Visconti, I. ( author ) / Sion, Radu
-
Conference:Conference; 14th, Financial cryptography and data security ; 2010 ; Tenerife, Spain
-
Published in:Financial cryptography and data security , 6054 ; 94-104LECTURE NOTES IN COMPUTER SCIENCE , 6054 ; 94-104
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2010-01-01
-
Size:11 pages
-
Remarks:Based on those presented at the conference.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained DevicesEngels, D. / Fan, X. / Gong, G. / Hu, H. / Smith, E.M. et al. | 2010
- 19
-
Lighten Encryption Schemes for Secure and Private RFID SystemsCanard, S. / Coisel, I. / Etrog, J. et al. | 2010
- 34
-
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 TagsMelia-Segui, J. / Garcia-Alfaro, J. / Herrera-Joancomarti, J. et al. | 2010
- 47
-
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected ResultsTamura, J. / Kobara, K. / Fathi, H. / Imai, H. et al. | 2010
- 57
-
Reliable Food Traceability Using RFID TaggingAzuara, G. / Salazar, J.L. / Tornos, J.L. / Piles, J.J. et al. | 2010
- 68
-
Lightweight Cryptography and DPA Countermeasures: A SurveyMoradi, A. / Poschmann, A. et al. | 2010
- 80
-
Securing the Use of RFID-Enabled BanknotesMartinez, S. / Roig, C. / Valls, M. et al. | 2010
- 94
-
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-PassportsAuletta, V. / Blundo, C. / De Caro, A. / De Cristofaro, E. / Persiano, G. / Visconti, I. et al. | 2010
- 107
-
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less ApplicationsCoron, J.-S. / Gouget, A. / Paillier, P. / Villegas, K. et al. | 2010
- 123
-
A Secure and Privacy-Preserving Targeted Ad-SystemAndroulaki, E. / Bellovin, S.M. et al. | 2010
- 136
-
Cryptographic Cloud StorageKamara, S. / Lauter, K. et al. | 2010
- 150
-
Extending IPsec for Efficient Remote AttestationSadeghi, A.-R. / Schulz, S. et al. | 2010
- 166
-
Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM RestrictionsKravitz, D.W. et al. | 2010
- 182
-
How to Evaluate the Security of Real-Life Cryptographic Protocols? The Cases of ISO/IEC 29128 and CRYPTRECMatsuo, S. / Miyazaki, K. / Otsuka, A. / Basin, D. et al. | 2010
- 197
-
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals (Keynote Talk)Fleischmann, K.R. et al. | 2010
- 203
-
A Case Study on Measuring Statistical Data in the Tor Anonymity NetworkLoesing, K. / Murdoch, S.J. / Dingledine, R. et al. | 2010
- 216
-
A Case Study in Ethical Decision Making Regarding Remote Mitigation of BotnetsDittrich, D. / Leder, F. / Werner, T. et al. | 2010
- 231
-
Ethical Proactive Threat Research (Position Paper)Aycock, J. / Sullins, J. et al. | 2010
- 240
-
A Framework for Understanding and Applying Ethical Principles in Network and Security Research (Position Paper)Kenneally, E. / Bailey, M. / Maughan, D. et al. | 2010
- 247
-
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects (Panel)Cranor, L.F. et al. | 2010
- 250
-
Ethical Guidelines for Computer Security Researchers: ``Be Reasonable'' (Panel)Sassaman, L. et al. | 2010