LEADER 04074oam 2200661 450 001 996465614903316 005 20210522190540.0 010 $a1-282-33187-6 010 $a9786612331879 010 $a3-642-03549-3 024 7 $a10.1007/978-3-642-03549-4 035 $a(CKB)1000000000761242 035 $a(EBL)450549 035 $a(OCoLC)437346671 035 $a(SSID)ssj0000296400 035 $a(PQKBManifestationID)11236261 035 $a(PQKBTitleCode)TC0000296400 035 $a(PQKBWorkID)10321767 035 $a(PQKB)10213812 035 $a(DE-He213)978-3-642-03549-4 035 $a(MiAaPQ)EBC450549 035 $a(MiAaPQ)EBC6416131 035 $a(PPN)136310966 035 $a(EXLCZ)991000000000761242 100 $a20210522d2009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aFinancial cryptography and data security $e13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009 : revised selected papers /$fRoger Dingledine, Philippe Golle (editors) 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer,$d[2009] 210 4$d©2009 215 $a1 online resource (389 p.) 225 1 $aLecture Notes in Computer Science ;$v5628 300 $aDescription based upon print version of record. 311 $a3-642-03548-5 320 $aIncludes bibliographical references. 327 $aEconomics of Information Security I -- Mitigating Inadvertent Insider Threats with Incentives -- Deterring Online Advertising Fraud through Optimal Payment in Arrears -- Anonymity and Privacy I -- Privacy-Preserving Information Markets for Computing Statistical Data -- Achieving Privacy in a Federated Identity Management System -- Data Hemorrhages in the Health-Care Sector -- Private Computation -- Solving Linear Programs Using Multiparty Computation -- Private Intersection of Certified Sets -- Privacy-Preserving Classifier Learning -- Economics of Information Security II -- Investments and Trade-offs in the Economics of Information Security -- Blue versus Red: Towards a Model of Distributed Security Attacks -- Authentication and Identification -- Optimised to Fail: Card Readers for Online Banking -- Expecting the Unexpected: Towards Robust Credential Infrastructure -- Optical DNA -- Panel -- Passwords: If We?re So Smart, Why Are We Still Using Them? -- Fraud Detection -- Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection -- Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing -- Detecting Denial of Service Attacks in Tor -- Auctions -- Cryptographic Combinatorial Securities Exchanges -- Cryptographic Combinatorial Clock-Proxy Auctions -- Secure Multiparty Computation Goes Live -- Anonymity and Privacy II -- Coercion Resistant End-to-end Voting -- Relations Among Privacy Notions. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Financial Cryptography and Data Security, FC 2009, held in Accra Beach, Barbados, in February 2009. The 20 revised full papers and 1 revised short papers presented together with 1 panel report and 1 keynote address were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on economics of information security, anonymity and privacy, private computation, authentication and identification, fraud detection and auctions. 410 0$aLecture notes in computer science ;$v5628. 606 $aComputer software 606 $aComputer science 606 $aData protection 615 0$aComputer software. 615 0$aComputer science. 615 0$aData protection. 676 $a005.3 702 $aDingledine$b Roger$f1977- 702 $aGolle$b Philippe 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a996465614903316 996 $aFinancial Cryptography and Data Security$92568624 997 $aUNISA