05085nam 22007815 450 99646609250331620210609083110.03-540-46256-210.1007/11889663(CKB)1000000000283840(SSID)ssj0000317648(PQKBManifestationID)11211774(PQKBTitleCode)TC0000317648(PQKBWorkID)10294554(PQKB)11318406(DE-He213)978-3-540-46256-9(MiAaPQ)EBC3068674(PPN)123138892(EXLCZ)99100000000028384020100301d2006 u| 0engurnn#008mamaatxtccrFinancial Cryptography and Data Security[electronic resource] 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers /edited by Giovanni Di Crescenzo, Avi Rubin1st ed. 2006.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2006.1 online resource (XI, 327 p.)Security and Cryptology ;4107Bibliographic Level Mode of Issuance: Monograph3-540-46255-4 Includes bibliographical references and index.Authentication and Fraud Detection -- Phoolproof Phishing Prevention -- A Protocol for Secure Public Instant Messaging -- Using Automated Banking Certificates to Detect Unauthorised Financial Transactions -- Privacy -- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption -- A Private Stable Matching Algorithm -- Private Policy Negotiation -- Reputation and Mix-Nets -- Uncheatable Reputation for Distributed Computation Markets -- An Efficient Publicly Verifiable Mix-Net for Long Inputs -- Auditable Privacy: On Tamper-Evident Mix Networks -- Short Papers -- A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation -- Defeating Malicious Servers in a Blind Signatures Based Voting System -- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng -- Credit Transfer for Market-Based Infrastructure -- A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions -- Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones -- Conditional Financial Cryptography -- A Generic Construction for Token-Controlled Public Key Encryption -- Timed-Release and Key-Insulated Public Key Encryption -- Conditional Encrypted Mapping and Comparing Encrypted Numbers -- Revisiting Oblivious Signature-Based Envelopes -- Payment Systems -- Provably Secure Electronic Cash Based on Blind Multisignature Schemes -- Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings -- Privacy-Protecting Coupon System Revisited -- Efficient Protocols -- Efficient Broadcast Encryption Scheme with Log-Key Storage -- Efficient Correlated Action Selection -- Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.Security and Cryptology ;4107Data encryption (Computer science)Operating systems (Computers)Management information systemsComputer scienceComputers and civilizationComputer communication systemsAlgorithmsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Data encryption (Computer science).Operating systems (Computers).Management information systems.Computer science.Computers and civilization.Computer communication systems.Algorithms.Cryptology.Operating Systems.Management of Computing and Information Systems.Computers and Society.Computer Communication Networks.Algorithm Analysis and Problem Complexity.005.82Di Crescenzo Giovanniedthttp://id.loc.gov/vocabulary/relators/edtRubin Avi1971-edthttp://id.loc.gov/vocabulary/relators/edtBOOK996466092503316Financial Cryptography and Data Security772196UNISA