LEADER 04168nam 2200661 a 450 001 9910482966103321 005 20200520144314.0 010 $a3-540-46256-2 024 7 $a10.1007/11889663 035 $a(CKB)1000000000283840 035 $a(SSID)ssj0000317648 035 $a(PQKBManifestationID)11211774 035 $a(PQKBTitleCode)TC0000317648 035 $a(PQKBWorkID)10294554 035 $a(PQKB)11318406 035 $a(DE-He213)978-3-540-46256-9 035 $a(MiAaPQ)EBC3068674 035 $a(PPN)123138892 035 $a(EXLCZ)991000000000283840 100 $a20060818d2006 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFinancial cryptography and data security $e10th international conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 : revised selected papers /$fGiovanni Di Crescenzo, Avi Rubin (eds.) 205 $a1st ed. 2006. 210 $aBerlin $cSpringer$d2006 215 $a1 online resource (XI, 327 p.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v4107 225 1 $aLNCS sublibrary. SL 4, Security and cryptology 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-46255-4 320 $aIncludes bibliographical references and index. 327 $aAuthentication and Fraud Detection -- Phoolproof Phishing Prevention -- A Protocol for Secure Public Instant Messaging -- Using Automated Banking Certificates to Detect Unauthorised Financial Transactions -- Privacy -- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption -- A Private Stable Matching Algorithm -- Private Policy Negotiation -- Reputation and Mix-Nets -- Uncheatable Reputation for Distributed Computation Markets -- An Efficient Publicly Verifiable Mix-Net for Long Inputs -- Auditable Privacy: On Tamper-Evident Mix Networks -- Short Papers -- A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation -- Defeating Malicious Servers in a Blind Signatures Based Voting System -- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng -- Credit Transfer for Market-Based Infrastructure -- A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions -- Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones -- Conditional Financial Cryptography -- A Generic Construction for Token-Controlled Public Key Encryption -- Timed-Release and Key-Insulated Public Key Encryption -- Conditional Encrypted Mapping and Comparing Encrypted Numbers -- Revisiting Oblivious Signature-Based Envelopes -- Payment Systems -- Provably Secure Electronic Cash Based on Blind Multisignature Schemes -- Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings -- Privacy-Protecting Coupon System Revisited -- Efficient Protocols -- Efficient Broadcast Encryption Scheme with Log-Key Storage -- Efficient Correlated Action Selection -- Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination. 410 0$aLecture notes in computer science ;$v4107. 410 0$aLNCS sublibrary.$nSL 4,$pSecurity and cryptology. 517 3 $aFC 2006 606 $aElectronic funds transfers$xSecurity measures$vCongresses 606 $aData encryption (Computer science)$vCongresses 606 $aElectronic commerce$xSecurity measures$vCongresses 606 $aComputer networks$xSecurity measures$vCongresses 606 $aInternet$xSecurity measures$vCongresses 615 0$aElectronic funds transfers$xSecurity measures 615 0$aData encryption (Computer science) 615 0$aElectronic commerce$xSecurity measures 615 0$aComputer networks$xSecurity measures 615 0$aInternet$xSecurity measures 676 $a005.82 701 $aDi Crescenzo$b Giovanni$01752933 701 $aRubin$b Avi$01752934 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910482966103321 996 $aFinancial cryptography and data security$94188440 997 $aUNINA