skip to content
Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers Preview this item
ClosePreview this item
Checking...

Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers

Author: Ahmad-Reza Sadeghi
Publisher: Berlin : Springer, 2013.
Series: Lecture notes in computer science, 7859; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections:  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Congresses
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Ahmad-Reza Sadeghi
ISBN: 9783642398841 3642398847
OCLC Number: 857227955
Description: 1 online resource (xvi, 406 pages) : illustrations.
Contents: Keynote. Can Nature Help Us Solve Risk Management Issues? / William H. Saito --
Electronic Payment (Bitcoin). Quantitative Analysis of the Full Bitcoin Transaction Graph / Dorit Ron, Adi Shamir --
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk / Tyler Moore, Nicolas Christin --
Evaluating User Privacy in Bitcoin / Elli Androulaki ... [et al.] --
Usability Aspects. The Importance of Being Earnest [In Security Warnings] / Serge Egelman, Stuart Schechter --
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing / Alexander Gallego, Nitesh Saxena, Jonathan Voris --
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication / Tiffany Hyun-Jin Kim ... [et al.] --
Secure Computation. Practical Fully Simulatable Oblivious Transfer with Sublinear Communication / Bingsheng Zhang ... [et al.] --
Unconditionally-Secure Robust Secret Sharing with Minimum Share Size / Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini --
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data / Marc Joye, Benoît Libert --
Passwords. "Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks / David Aspinall, Mike Just --
Hey, You, Get Off of My Clipboard / Sascha Fahl ... [et al.] --
Privacy Primitives and Non-repudiation. Unique Ring Signatures: A Practical Construction / Matthew Franklin, Haibin Zhang --
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency / Kwangsu Lee, Dong Hoon Lee, Moti Yung --
Accumulators and U-Prove Revocation / Tolga Acar, Sherman S. M. Chow, Lan Nguyen --
Anonymity. Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy / Johannes Buchmann, Denise Demirel, Jeroen van de Graaf --
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems / Andy Rupp ... [et al.] --
Hardware Security. Coupon Collector's Problem for Fault Analysis against AES --
High Tolerance for Noisy Fault Injections / Yu Sasaki ... [et al.] --
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study / Jonas Maebe ... [et al.] --
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards / Yuanyuan Zhou ... [et al.] --
Secure Computation and Secret Sharing. Securely Solving Simple Combinatorial Graph Problems / Abdelrahaman Aly ... [et al.] --
Parallel and Dynamic Searchable Symmetric Encryption / Seny Kamara, Charalampos Papamanthou --
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits / Thomas Schneider, Michael Zohner --
Invited Talk. The Untapped Potential of Trusted Execution Environments on Mobile Devices / N. Asokan, Jan-Erik Ekberg, Kari Kostiainen --
Authentication Attacks and Countermeasures. Stark / Tilo Müller ... [et al.] --
Risks of Offline Verify PIN on Contactless Cards / Martin Emms, Budi Arief, Nicholas Little, Aad van Moorsel --
How to Attack Two-Factor Authentication Internet Banking / Manal Adham ... [et al.] --
CAge: Taming Certificate Authorities by Inferring Restricted Scopes / James Kasten, Eric Wustrow, J. Alex Halderman --
Privacy of Data and Communciation. Interdependent Privacy: Let Me Share Your Data / Gergely Biczók, Pern Hui Chia --
A Secure Submission System for Online Whistleblowing Platforms / Volker Roth ... [et al.] --
Securing Anonymous Communication Channels under the Selective DoS Attack / Anupam Das, Nikita Borisov --
Private Data Retrieval. PIRMAP: Efficient Private Information Retrieval for MapReduce / Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan --
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates / Justin Cappos --
Posters. Three-Factor User Authentication Method Using Biometrics Challenge Response / Haruhiko Fujii, Yukio Tsuruoka --
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services / Chrystel Gaber ... [et al.] --
Onions for Sale: Putting Privacy on the Market / Aaron Johnson, Rob Jansen, Paul Syverson --
Searchable Encryption Supporting General Boolean Expression Queries / Tarik Moataz, Abdullatif Shikfa --
A Privacy Preserving E-Payment Architecture / Aude Plateaux ... [et al.] --
Communication Services Empowered with a Classical Chaos Based Cryptosystem / Gerard Vidal, Mikel Hernaez.
Series Title: Lecture notes in computer science, 7859; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: FC 2013
Responsibility: Ahmad-Reza Sadeghi (ed.).
More information:

Abstract:

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/857227955>
library:oclcnum"857227955"
library:placeOfPublication
owl:sameAs<info:oclcnum/857227955>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1391262489>
schema:genre"Conference proceedings"
schema:genre"Electronic books."
schema:inLanguage"en"
schema:name"Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers"
schema:name"FC 2013"
schema:url
schema:url
schema:workExample
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.