Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short paper...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Sadeghi, Ahmad-Reza (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Σειρά:Lecture Notes in Computer Science, 7859
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06016nam a22005175i 4500
001 978-3-642-39884-1
003 DE-He213
005 20151030101728.0
007 cr nn 008mamaa
008 130805s2013 gw | s |||| 0|eng d
020 |a 9783642398841  |9 978-3-642-39884-1 
024 7 |a 10.1007/978-3-642-39884-1  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.82  |2 23 
245 1 0 |a Financial Cryptography and Data Security  |h [electronic resource] :  |b 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers /  |c edited by Ahmad-Reza Sadeghi. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2013. 
300 |a XVI, 406 p. 70 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 7859 
505 0 |a Keynote -- Can Nature Help Us Solve Risk Management Issues? Position Paper -- Electronic Payment (Bitcoin) -- Quantitative Analysis of the Full Bitcoin Transaction Graph -- Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk (Short Paper) -- Evaluating User Privacy in Bitcoin -- Usability Aspects -- The Importance of Being Earnest [In Security Warnings] (Short Paper) -- Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing (Short Paper) -- RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication (Short Paper) -- Secure Computation -- Practical Fully Simulatable Oblivious Transfer with Sublinear Communication -- Unconditionally-Secure Robust Secret Sharing with Minimum Share Size -- A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data -- Passwords -- “Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks -- Hey, You, Get Off of My Clipboard: On How Usability Trumps Security in Android Password Managers -- Privacy Primitives and Non-repudiation -- Unique Ring Signatures: A Practical Construction (Short Paper) -- Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency -- Accumulators and U-Prove Revocation (Short Paper) -- Anonymity -- Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy (Short Paper) -- P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems (Short Paper) -- Hardware Security -- Coupon Collector’s Problem for Fault Analysis against AES – High Tolerance for Noisy Fault Injections (Short Paper) -- Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study (Short Paper) -- On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards (Short Paper) -- Secure Computation and Secret Sharing -- Securely Solving Simple Combinatorial Graph Problems -- Parallel and Dynamic Searchable Symmetric Encryption -- GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits -- Invited Talk -- The Untapped Potential of Trusted Execution Environments on Mobile Devices: Extended Abstract -- Authentication Attacks and Countermeasures -- Stark: Tamperproof Authentication to Resist Keylogging -- Risks of Offline Verify PIN on Contactless Cards (Short Paper) -- How to Attack Two-Factor Authentication Internet Banking (Short Paper) -- CAge: Taming Certificate Authorities by Inferring Restricted Scopes (Short Paper) -- Privacy of Data and Communication -- Interdependent Privacy: Let Me Share Your Data -- A Secure Submission System for Online Whistle blowing Platforms (Short Paper) -- Securing Anonymous Communication Channels under the Selective DoS Attack (Short Paper) -- Private Data Retrieval -- PIRMAP: Efficient Private Information Retrieval for MapReduce -- Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates (Short Paper) -- Posters -- Three-Factor User Authentication Method Using Biometrics Challenge Response -- Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services -- Onions for Sale: Putting Privacy on the Market -- Searchable Encryption Supporting General Boolean Expression Queries -- A Privacy Preserving E-Payment Architecture -- Communication Services Empowered with a Classical Chaos Based Cryptosystem. 
520 |a This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval. 
650 0 |a Computer science. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science). 
650 0 |a Application software. 
650 0 |a E-commerce. 
650 1 4 |a Computer Science. 
650 2 4 |a Data Encryption. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a e-Commerce/e-business. 
650 2 4 |a Computer Appl. in Administrative Data Processing. 
700 1 |a Sadeghi, Ahmad-Reza.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642398834 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 7859 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-39884-1  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)