Table of Contents
WLC Preface Josep M. Miret Francesc Sebé 1
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices Daniel Engels Xinxin Fan Guang Gong Honggang Hu Eric M. Smith 3
Lighten Encryption Schemes for Secure and Private RFID Systems Sébastien Canard Iwen Coisel Jonathan Etrog 19
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags J. Melia-Segui J. Garcia-Alfaro J. Herrera-Joancomarti 34
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results Jin Tamura Kazukuni Kobara Hanane Fathi Hideki Imai 47
Reliable Food Traceability Using RFID Tagging Guillermo Azuara José L. Salazar José L. Tornos Joan J. Piles 57
Lightweight Cryptography and DPA Countermeasures: A Survey Amir Moradi Axel Poschmann 68
Securing the Use of RFID-Enabled Banknotes Santi Martínez Concepció Roig Magda Valls 80
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports Vincenzo Auletta Carlo Blundo Angelo De Caro Emiliano De Cristofaro Giuseppe Persiano Ivan Visconti 94
RLCPS Preface Aggelos Kiayias Kazue Sako 105
SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications Jean-Sébastien Coron Aline Gouget Pascal Paillier Karine Villegas 107
A Secure and Privacy-Preserving Targeted Ad-System Elli Androulaki Steven M. Bellovin 123
Cryptographic Cloud Storage Seny Kamara Kristin Lauter 136
Extending IPsec for Efficient Remote Attestation Ahmad-Reza Sadeghi Steffen Schulz 150
Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions David William Kravitz 166
How to Evaluate the Security of Real-Life Cryptographic Protocols" The Cases of ISO/IEC 29128 and CRYPTREC Shin'ichiro Matsuo Kunihiko Miyazaki Akira Otsuka David Basin 182
WECSR Preface Sven Dietrich 195
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals (Keynote Talk) Kenneth R. Fleischmann 197
A Case Study on Measuring Statistical Data in the Tor Anonymity Network Karsten Loesing Steven J. Murdoch Roger Dingledine 203
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets David Dittrich Felix Leder Tillmann Werner 216
Ethical Proactive Threat Research (Position Paper) John Aycock John Sullins 231
A Framework for Understanding and Applying Ethical Principles in Network and Security Research (Position Paper) Erin Kenneally Michael Bailey Douglas Maughan 240
Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects (Panel) Lorrie Faith Cranor 247
Ethical Guidelines for Computer Security Researchers: "Be Reasonable" (Panel) Len Sassaman 250
Author Index 257