Financial Cryptography and Data Security [[electronic resource] ] : 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 - March 3, 2005, Revised Papers / / edited by Andrew S. Patrick, Moti Yung |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XII, 376 p.) |
Disciplina | 005.8/2 |
Collana | Security and Cryptology |
Soggetto topico |
Cryptography
Data encryption (Computer science) Operating systems (Computers) Electronic data processing—Management Computers and civilization Computer networks Algorithms Cryptology Operating Systems IT Operations Computers and Society Computer Communication Networks |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Threat and Attacks -- Fraud Within Asymmetric Multi-hop Cellular Networks -- Protecting Secret Data from Insider Attacks -- Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling -- Invited Speaker -- Trust and Swindling on the Internet -- Digital Signing Methods -- Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures) -- Time Capsule Signature -- Policy-Based Cryptography and Applications -- Panel -- A Chat at the Old Phishin’ Hole -- Modeling and Preventing Phishing Attacks -- Helping the Phish Detect the Lure -- Who’d Phish from the Summit of Kilimanjaro? -- Privacy -- A Privacy-Protecting Coupon System -- Testing Disjointness of Private Datasets -- Hardware Oriented Mechanisms -- RFID Traceability: A Multilayer Problem -- Information-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk Assurance for Hedge Funds Using Zero Knowledge Proofs -- Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure -- Systems, Applications, and Experiences -- Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce -- Securing Sensitive Data with the Ingrian DataSecure Platform -- Ciphire Mail Email Encryption and Authentication -- Message Authentication -- A User-Friendly Approach to Human Authentication of Messages -- Approximate Message Authentication and Biometric Entity Authentication -- Exchanges and Contracts -- Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model -- Achieving Fairness in Private Contract Negotiation -- Auctions and Voting -- Small Coalitions Cannot Manipulate Voting -- Efficient Privacy-Preserving Protocols for Multi-unit Auctions -- Event Driven Private Counters -- Works in Progress -- Secure Distributed Human Computation -- Secure Multi-attribute Procurement Auction -- Audit File Reduction Using N-Gram Models -- User Authentication -- Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication -- Secure Biometric Authentication for Weak Computational Devices -- Panel Summary: Incentives, Markets and Information Security. |
Record Nr. | UNISA-996465824003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Financial cryptography and data security : 9th International Conference, FC 2005, Roseau, The Commonwaelth of Dominica, February 28- March 3, 2005 : revised papers / / Andrew S. Patrick, Moti Yung (eds.) |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2005 |
Descrizione fisica | 1 online resource (XII, 376 p.) |
Disciplina | 005.8/2 |
Altri autori (Persone) |
PatrickAndrew S
YungMoti |
Collana | Lecture notes in computer science |
Soggetto topico |
Electronic funds transfers - Security measures
Data encryption (Computer science) Electronic commerce - Security measures Computer networks - Security measures Internet - Security measures |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Threat and Attacks -- Fraud Within Asymmetric Multi-hop Cellular Networks -- Protecting Secret Data from Insider Attacks -- Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling -- Invited Speaker -- Trust and Swindling on the Internet -- Digital Signing Methods -- Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures) -- Time Capsule Signature -- Policy-Based Cryptography and Applications -- Panel -- A Chat at the Old Phishin’ Hole -- Modeling and Preventing Phishing Attacks -- Helping the Phish Detect the Lure -- Who’d Phish from the Summit of Kilimanjaro? -- Privacy -- A Privacy-Protecting Coupon System -- Testing Disjointness of Private Datasets -- Hardware Oriented Mechanisms -- RFID Traceability: A Multilayer Problem -- Information-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk Assurance for Hedge Funds Using Zero Knowledge Proofs -- Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure -- Systems, Applications, and Experiences -- Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce -- Securing Sensitive Data with the Ingrian DataSecure Platform -- Ciphire Mail Email Encryption and Authentication -- Message Authentication -- A User-Friendly Approach to Human Authentication of Messages -- Approximate Message Authentication and Biometric Entity Authentication -- Exchanges and Contracts -- Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model -- Achieving Fairness in Private Contract Negotiation -- Auctions and Voting -- Small Coalitions Cannot Manipulate Voting -- Efficient Privacy-Preserving Protocols for Multi-unit Auctions -- Event Driven Private Counters -- Works in Progress -- Secure Distributed Human Computation -- Secure Multi-attribute Procurement Auction -- Audit File Reduction Using N-Gram Models -- User Authentication -- Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication -- Secure Biometric Authentication for Weak Computational Devices -- Panel Summary: Incentives, Markets and Information Security. |
Altri titoli varianti | FC 2005 |
Record Nr. | UNINA-9910483878903321 |
Berlin ; ; New York, : Springer, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|