//]]>
Normal View MARC View ISBD View

Financial Cryptography and Data Security

by Sion, Radu.
Authors: SpringerLink (Online service) Series: Lecture Notes in Computer Science, 0302-9743 ; . 6052 Physical details: XII, 432p. 77 illus. online resource. ISBN: 3642145779 Subject(s): Computer science. | Data encryption (Computer science). | Computer Science. | Data Encryption.
Tags from this library:
No tags from this library for this title.
Item type Location Call Number Status Date Due
E-Book E-Book AUM Main Library 005.82 (Browse Shelf) Not for loan

Constructive Cryptography – A Primer -- Security Mechanisms with Selfish Players in Wireless Networks -- Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory -- Multichannel Protocols to Prevent Relay Attacks -- A Traceability Attack against e-Passports -- Secure Computation with Fixed-Point Numbers -- Implementing a High-Assurance Smart-Card OS -- Unlinkable Priced Oblivious Transfer with Rechargeable Wallets -- Multiple Denominations in E-cash with Compact Transaction Data -- What’s in a Name? -- Cryptographic Protocol Analysis of AN.ON -- A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys -- Practical Private Set Intersection Protocols with Linear Complexity -- Design and Implementation of a Key-Lifecycle Management System -- Measuring the Perpetrators and Funders of Typosquatting -- A Learning-Based Approach to Reactive Security -- Embedded SFE: Offloading Server and Network Using Hardware Tokens -- The Phish-Market Protocol: Securely Sharing Attack Data between Competitors -- Building Incentives into Tor -- Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections -- Automatically Preparing Safe SQL Queries -- PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure -- Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy -- Designing for Audit: A Voting Machine with a Tiny TCB -- Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits -- Security Applications of Diodes with Unique Current-Voltage Characteristics -- Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication -- All You Can Eat or Breaking a Real-World Contactless Payment System -- Shoulder-Surfing Safe Login in a Partially Observable Attacker Model -- Using Sphinx to Improve Onion Routing Circuit Construction -- Secure Multiparty AES -- Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis -- On Robust Key Agreement Based on Public Key Authentication -- A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing -- Signatures of Reputation -- Intention-Disguised Algorithmic Trading -- When Information Improves Information Security -- BetterThanPin: Empowering Users to Fight Phishing (Poster) -- Certification Intermediaries and the Alternative (Poster) -- SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs -- Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks -- Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols -- hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers.

This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Financial Cryptography and Data Security, FC 2010, held in Tenerife, Canary Islands, Spain in January 2010. The 19 revised full papers and 15 revised short papers presented together with 1 panel report and 7 poster papers were carefully reviewed and selected from 130 submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security.

There are no comments for this item.

Log in to your account to post a comment.

Languages: 
English |
العربية