Financial Cryptography and Data Security 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers /
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Financial Cryptography and Data Security, FC 2009, held in Accra Beach, Barbados, in February 2009. The 20 revised full papers and 1 revised short papers presented together with 1 panel...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2009.
|
Σειρά: | Lecture Notes in Computer Science,
5628 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Economics of Information Security I
- Mitigating Inadvertent Insider Threats with Incentives
- Deterring Online Advertising Fraud through Optimal Payment in Arrears
- Anonymity and Privacy I
- Privacy-Preserving Information Markets for Computing Statistical Data
- Achieving Privacy in a Federated Identity Management System
- Data Hemorrhages in the Health-Care Sector
- Private Computation
- Solving Linear Programs Using Multiparty Computation
- Private Intersection of Certified Sets
- Privacy-Preserving Classifier Learning
- Economics of Information Security II
- Investments and Trade-offs in the Economics of Information Security
- Blue versus Red: Towards a Model of Distributed Security Attacks
- Authentication and Identification
- Optimised to Fail: Card Readers for Online Banking
- Expecting the Unexpected: Towards Robust Credential Infrastructure
- Optical DNA
- Panel
- Passwords: If We’re So Smart, Why Are We Still Using Them?
- Fraud Detection
- Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection
- Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
- Detecting Denial of Service Attacks in Tor
- Auctions
- Cryptographic Combinatorial Securities Exchanges
- Cryptographic Combinatorial Clock-Proxy Auctions
- Secure Multiparty Computation Goes Live
- Anonymity and Privacy II
- Coercion Resistant End-to-end Voting
- Relations Among Privacy Notions.