Financial cryptography and data security : 10th international conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006 : revised selected papers / Giovanni Di Crescenzo, Avi Rubin (eds.).

By: (10th : FC (Conference) (10th : 2006 : Anguilla)
Contributor(s): Di Crescenzo, Giovanni | Rubin, Aviel D
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 4107.; LNCS sublibrary: Publisher: Berlin ; New York : Springer, ©2006Description: 1 online resource (xi, 325 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783540462569; 3540462562; 3540462554; 9783540462552Other title: FC 2006Subject(s): Electronic funds transfers -- Security measures -- Congresses | Data encryption (Computer science) -- Congresses | Electronic commerce -- Security measures -- Congresses | Computer networks -- Security measures -- Congresses | Internet -- Security measures -- Congresses | Monnaie électronique -- Sécurité -- Mesures -- Congrès | Chiffrement (Informatique) -- Congrès | Commerce électronique -- Sécurité -- Mesures -- Congrès | Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès | Internet -- Sécurité -- Mesures -- Congrès | Informatique | Computer networks -- Security measures | Data encryption (Computer science) | Electronic commerce -- Security measures | Electronic funds transfers -- Security measures | Internet -- Security measures | algoritmen | algorithms | computeranalyse | computer analysis | computers | samenleving | society | informatiesystemen | information systems | computerwetenschappen | computer sciences | computernetwerken | computer networks | gegevensbeheer | data management | operating systems | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. Additional physical formats: Print version:: Financial cryptography and data security.DDC classification: 332.1028 LOC classification: HG1710 | .F35 2006ebOnline resources: Click here to access online
Contents:
Authentication and Fraud Detection -- Phoolproof Phishing Prevention -- A Protocol for Secure Public Instant Messaging -- Using Automated Banking Certificates to Detect Unauthorised Financial Transactions -- Privacy -- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption -- A Private Stable Matching Algorithm -- Private Policy Negotiation -- Reputation and Mix-Nets -- Uncheatable Reputation for Distributed Computation Markets -- An Efficient Publicly Verifiable Mix-Net for Long Inputs -- Auditable Privacy: On Tamper-Evident Mix Networks -- Short Papers -- A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation -- Defeating Malicious Servers in a Blind Signatures Based Voting System -- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng -- Credit Transfer for Market-Based Infrastructure -- A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions -- Cryptanalysis of a Partially Blind Signature Scheme orHowtoMake$100Billswith$1and$2Ones -- Conditional Financial Cryptography -- A Generic Construction for Token-Controlled Public Key Encryption -- Timed-Release and Key-Insulated Public Key Encryption -- Conditional Encrypted Mapping and Comparing Encrypted Numbers -- Revisiting Oblivious Signature-Based Envelopes -- Payment Systems -- Provably Secure Electronic Cash Based on Blind Multisignature Schemes -- Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings -- Privacy-Protecting Coupon System Revisited -- Efficient Protocols -- Efficient Broadcast Encryption Scheme with Log-Key Storage -- Efficient Correlated Action Selection -- Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

Print version record.

Authentication and Fraud Detection -- Phoolproof Phishing Prevention -- A Protocol for Secure Public Instant Messaging -- Using Automated Banking Certificates to Detect Unauthorised Financial Transactions -- Privacy -- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption -- A Private Stable Matching Algorithm -- Private Policy Negotiation -- Reputation and Mix-Nets -- Uncheatable Reputation for Distributed Computation Markets -- An Efficient Publicly Verifiable Mix-Net for Long Inputs -- Auditable Privacy: On Tamper-Evident Mix Networks -- Short Papers -- A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation -- Defeating Malicious Servers in a Blind Signatures Based Voting System -- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng -- Credit Transfer for Market-Based Infrastructure -- A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions -- Cryptanalysis of a Partially Blind Signature Scheme orHowtoMake$100Billswith$1and$2Ones -- Conditional Financial Cryptography -- A Generic Construction for Token-Controlled Public Key Encryption -- Timed-Release and Key-Insulated Public Key Encryption -- Conditional Encrypted Mapping and Comparing Encrypted Numbers -- Revisiting Oblivious Signature-Based Envelopes -- Payment Systems -- Provably Secure Electronic Cash Based on Blind Multisignature Schemes -- Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings -- Privacy-Protecting Coupon System Revisited -- Efficient Protocols -- Efficient Broadcast Encryption Scheme with Log-Key Storage -- Efficient Correlated Action Selection -- Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.

There are no comments for this item.

to post a comment.

Powered by Koha