LEADER 04634nam 22005295 450 001 996465789603316 005 20210622120517.0 010 $a1-280-38809-9 010 $a9786613566010 010 $a3-642-14577-9 024 7 $a10.1007/978-3-642-14577-3 035 $a(CKB)2550000000015613 035 $a(SSID)ssj0000446466 035 $a(PQKBManifestationID)11297675 035 $a(PQKBTitleCode)TC0000446466 035 $a(PQKBWorkID)10496223 035 $a(PQKB)10127500 035 $a(DE-He213)978-3-642-14577-3 035 $a(MiAaPQ)EBC3065556 035 $a(PPN)149072716 035 $a(EXLCZ)992550000000015613 100 $a20100716d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFinancial Cryptography and Data Security$b[electronic resource] $e14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers /$fedited by Radu Sion 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XII, 432p. 77 illus.) 225 1 $aSecurity and Cryptology ;$v6052 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-14576-0 320 $aIncludes bibliographical references and index. 327 $aConstructive Cryptography ? A Primer -- Security Mechanisms with Selfish Players in Wireless Networks -- Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory -- Multichannel Protocols to Prevent Relay Attacks -- A Traceability Attack against e-Passports -- Secure Computation with Fixed-Point Numbers -- Implementing a High-Assurance Smart-Card OS -- Unlinkable Priced Oblivious Transfer with Rechargeable Wallets -- Multiple Denominations in E-cash with Compact Transaction Data -- What?s in a Name? -- Cryptographic Protocol Analysis of AN.ON -- A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys -- Practical Private Set Intersection Protocols with Linear Complexity -- Design and Implementation of a Key-Lifecycle Management System -- Measuring the Perpetrators and Funders of Typosquatting -- A Learning-Based Approach to Reactive Security -- Embedded SFE: Offloading Server and Network Using Hardware Tokens -- The Phish-Market Protocol: Securely Sharing Attack Data between Competitors -- Building Incentives into Tor -- Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections -- Automatically Preparing Safe SQL Queries -- PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure -- Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy -- Designing for Audit: A Voting Machine with a Tiny TCB -- Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits -- Security Applications of Diodes with Unique Current-Voltage Characteristics -- Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication -- All You Can Eat or Breaking a Real-World Contactless Payment System -- Shoulder-Surfing Safe Login in a Partially Observable Attacker Model -- Using Sphinx to Improve Onion Routing Circuit Construction -- Secure Multiparty AES -- Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis -- On Robust Key Agreement Based on Public Key Authentication -- A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing -- Signatures of Reputation -- Intention-Disguised Algorithmic Trading -- When Information Improves Information Security -- BetterThanPin: Empowering Users to Fight Phishing (Poster) -- Certification Intermediaries and the Alternative (Poster) -- SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs -- Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks -- Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols -- hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers. 410 0$aSecurity and Cryptology ;$v6052 606 $aData encryption (Computer science) 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aData encryption (Computer science). 615 14$aCryptology. 676 $a005.82 702 $aSion$b Radu$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465789603316 996 $aFinancial Cryptography and Data Security$9772196 997 $aUNISA