Financial Cryptography and Data Security 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Sion, Radu (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6052
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Constructive Cryptography – A Primer
  • Security Mechanisms with Selfish Players in Wireless Networks
  • Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory
  • Multichannel Protocols to Prevent Relay Attacks
  • A Traceability Attack against e-Passports
  • Secure Computation with Fixed-Point Numbers
  • Implementing a High-Assurance Smart-Card OS
  • Unlinkable Priced Oblivious Transfer with Rechargeable Wallets
  • Multiple Denominations in E-cash with Compact Transaction Data
  • What’s in a Name?
  • Cryptographic Protocol Analysis of AN.ON
  • A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys
  • Practical Private Set Intersection Protocols with Linear Complexity
  • Design and Implementation of a Key-Lifecycle Management System
  • Measuring the Perpetrators and Funders of Typosquatting
  • A Learning-Based Approach to Reactive Security
  • Embedded SFE: Offloading Server and Network Using Hardware Tokens
  • The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
  • Building Incentives into Tor
  • Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections
  • Automatically Preparing Safe SQL Queries
  • PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure
  • Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy
  • Designing for Audit: A Voting Machine with a Tiny TCB
  • Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits
  • Security Applications of Diodes with Unique Current-Voltage Characteristics
  • Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication
  • All You Can Eat or Breaking a Real-World Contactless Payment System
  • Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
  • Using Sphinx to Improve Onion Routing Circuit Construction
  • Secure Multiparty AES
  • Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
  • On Robust Key Agreement Based on Public Key Authentication
  • A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
  • Signatures of Reputation
  • Intention-Disguised Algorithmic Trading
  • When Information Improves Information Security
  • BetterThanPin: Empowering Users to Fight Phishing (Poster)
  • Certification Intermediaries and the Alternative (Poster)
  • SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs
  • Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks
  • Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols
  • hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers.