Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
4107 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Authentication and Fraud Detection
- Phoolproof Phishing Prevention
- A Protocol for Secure Public Instant Messaging
- Using Automated Banking Certificates to Detect Unauthorised Financial Transactions
- Privacy
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- A Private Stable Matching Algorithm
- Private Policy Negotiation
- Reputation and Mix-Nets
- Uncheatable Reputation for Distributed Computation Markets
- An Efficient Publicly Verifiable Mix-Net for Long Inputs
- Auditable Privacy: On Tamper-Evident Mix Networks
- Short Papers
- A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation
- Defeating Malicious Servers in a Blind Signatures Based Voting System
- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng
- Credit Transfer for Market-Based Infrastructure
- A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions
- Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones
- Conditional Financial Cryptography
- A Generic Construction for Token-Controlled Public Key Encryption
- Timed-Release and Key-Insulated Public Key Encryption
- Conditional Encrypted Mapping and Comparing Encrypted Numbers
- Revisiting Oblivious Signature-Based Envelopes
- Payment Systems
- Provably Secure Electronic Cash Based on Blind Multisignature Schemes
- Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings
- Privacy-Protecting Coupon System Revisited
- Efficient Protocols
- Efficient Broadcast Encryption Scheme with Log-Key Storage
- Efficient Correlated Action Selection
- Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.