LEADER 06728nam 22008655 450 001 996465565203316 005 20200704234526.0 010 $a3-540-27809-5 024 7 $a10.1007/b98935 035 $a(CKB)1000000000212471 035 $a(DE-He213)978-3-540-27809-2 035 $a(SSID)ssj0000154964 035 $a(PQKBManifestationID)11151512 035 $a(PQKBTitleCode)TC0000154964 035 $a(PQKBWorkID)10099228 035 $a(PQKB)10692549 035 $a(MiAaPQ)EBC3088812 035 $a(PPN)155185691 035 $a(EXLCZ)991000000000212471 100 $a20121227d2004 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFinancial Cryptography$b[electronic resource] $e8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers /$fedited by Ari Juels 205 $a1st ed. 2004. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2004. 215 $a1 online resource (XI, 286 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v3110 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-22420-3 320 $aIncludes bibliographical references and index. 327 $aInvited Talks -- Analyzing the Success and Failure of Recent e-Payment Schemes -- Peppercoin Micropayments -- Loyalty and Micropayment Systems -- Microcredits for Verifiable Foreign Service Provider Metering -- A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves -- User Authentication -- Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop -- Call Center Customer Verification by Query-Directed Passwords -- Invited Talks -- Cryptography and the French Banking Cards: Past, Present, Future -- PayPass Security and Risk -- e-Voting -- The Vector-Ballot e-Voting Approach -- Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast -- Panel Session: Building Usable Security Systems -- Usability and Acceptability of Biometric Security Systems -- Mental Models of Computer Security -- Visualization Tools for Security Administrators -- Secure Interaction Design -- Invited Talk -- Bringing Payment Technology to the Unbanked -- Auctions and Lotteries -- Interleaving Cryptography and Mechanism Design -- Secure Generalized Vickrey Auction without Third-party Servers -- Electronic National Lotteries -- Identity-Based Chameleon Hash and Applications -- Game Theoretic and Cryptographic Tools -- Selecting Correlated Random Actions -- An Efficient and Usable Multi-show Non-transferable Anonymous Credential System -- The Ephemeral Pairing Problem -- Mix Networks and Anonymous Communications -- Mixminion: Strong Anonymity for Financial Cryptography -- Practical Anonymity for the Masses with MorphMix -- Timing Attacks in Low-Latency Mix Systems -- Provable Unlinkability against Traffic Analysis. 330 $aThe 8th Annual Financial Cryptography Conference was held during 9?12 February 2004 in Key West, Florida, USA. The conference was organized by the - international Financial Cryptography Association (IFCA). The program committee, which comprised 25 members, reviewed 78 submissions, of which only 17 were accepted for presentation at the conference. This year?s conference differed somewhat from those of previous years in its consideration of papers devoted to implementation, rather than purely conceptual research; one of these submissions was presented at the conference. This represented a movement in the conference toward practical problems and real-world perspectives as a complement to more traditional academic forms of research. In this spirit, the program included a number of excellent invited speakers. In the opening talk of the conference, Jack Selby threw down the gauntlet, - scribing some of the achievements of the PayPal system, but also enumerating reasons for the failures of many elegant e-cash schemes in the past. Ron Rivest, in contrast, described an emerging success in the cleverly conceived Peppercoin micropayment system. Jacques Stern enlightened us with his experience in the cryptographic design of banking cards in France. Simon Pugh unveiled some - tails of anew generation of wireless credit card. Finally,in deference to the many consumers in the world lacking either techno-savvy or technological resources that we often too easily take for granted, Jon Peha described a elded banking system that avoids reliance on conventional financial infrastructures. Thanks to all of these speakers for rounding out the conference with their expertise and breadth of vision. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v3110 606 $aFinance 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aComputer communication systems 606 $aFinance, general$3https://scigraph.springernature.com/ontologies/product-market-codes/600000 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 610 1 $aFC 610 1 $aFinancial cryptography 610 1 $aCryptography 615 0$aFinance. 615 0$aData encryption (Computer science). 615 0$aOperating systems (Computers). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aComputer communication systems. 615 14$aFinance, general. 615 24$aCryptology. 615 24$aOperating Systems. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 676 $a332/.0285/582 702 $aJuels$b Ari$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aFC 2004 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465565203316 996 $aFinancial Cryptography$9772724 997 $aUNISA