Financial Cryptography and Data Security 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Crescenzo, Giovanni Di (Επιμελητής έκδοσης), Rubin, Avi (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4107
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Authentication and Fraud Detection
  • Phoolproof Phishing Prevention
  • A Protocol for Secure Public Instant Messaging
  • Using Automated Banking Certificates to Detect Unauthorised Financial Transactions
  • Privacy
  • Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
  • A Private Stable Matching Algorithm
  • Private Policy Negotiation
  • Reputation and Mix-Nets
  • Uncheatable Reputation for Distributed Computation Markets
  • An Efficient Publicly Verifiable Mix-Net for Long Inputs
  • Auditable Privacy: On Tamper-Evident Mix Networks
  • Short Papers
  • A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation
  • Defeating Malicious Servers in a Blind Signatures Based Voting System
  • Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng
  • Credit Transfer for Market-Based Infrastructure
  • A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions
  • Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones
  • Conditional Financial Cryptography
  • A Generic Construction for Token-Controlled Public Key Encryption
  • Timed-Release and Key-Insulated Public Key Encryption
  • Conditional Encrypted Mapping and Comparing Encrypted Numbers
  • Revisiting Oblivious Signature-Based Envelopes
  • Payment Systems
  • Provably Secure Electronic Cash Based on Blind Multisignature Schemes
  • Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings
  • Privacy-Protecting Coupon System Revisited
  • Efficient Protocols
  • Efficient Broadcast Encryption Scheme with Log-Key Storage
  • Efficient Correlated Action Selection
  • Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.