pular para conteúdo
Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers Ver prévia deste item
FecharVer prévia deste item
Checando...

Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers

Autor: Ahmad-Reza Sadeghi
Editora: Berlin : Springer, 2013.
Séries: Lecture notes in computer science, 7859; LNCS sublibrary., SL 4,, Security and cryptology.
Edição/Formato   e-book : Documento : Publicação de conferência : InglêsVer todas as edições e formatos
Base de Dados:WorldCat
Resumo:
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections:  Ler mais...
Classificação:

(ainda não classificado) 0 com críticas - Seja o primeiro.

Assuntos
Mais como este

 

Encontrar uma cópia on-line

Links para este item

Encontrar uma cópia na biblioteca

&AllPage.SpinnerRetrieving; Encontrando bibliotecas que possuem este item...

Detalhes

Gênero/Forma: Electronic books
Conference papers and proceedings
Ebook
Congresses
Formato Físico Adicional: Printed edition:
Tipo de Material: Publicação de conferência, Documento, Recurso Internet
Tipo de Documento: Recurso Internet, Arquivo de Computador
Todos os Autores / Contribuintes: Ahmad-Reza Sadeghi
ISBN: 9783642398841 3642398847
Número OCLC: 857227955
Descrição: 1 online resource (xvi, 406 pages) : illustrations.
Conteúdos: Keynote. Can Nature Help Us Solve Risk Management Issues? / William H. Saito --
Electronic Payment (Bitcoin). Quantitative Analysis of the Full Bitcoin Transaction Graph / Dorit Ron, Adi Shamir --
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk / Tyler Moore, Nicolas Christin --
Evaluating User Privacy in Bitcoin / Elli Androulaki [and others] --
Usability Aspects. The Importance of Being Earnest [In Security Warnings] / Serge Egelman, Stuart Schechter --
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing / Alexander Gallego, Nitesh Saxena, Jonathan Voris --
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication / Tiffany Hyun-Jin Kim [and others] --
Secure Computation. Practical Fully Simulatable Oblivious Transfer with Sublinear Communication / Bingsheng Zhang [and others] --
Unconditionally-Secure Robust Secret Sharing with Minimum Share Size / Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini --
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data / Marc Joye, Benoît Libert. Passwords. "Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks / David Aspinall, Mike Just --
Hey, You, Get Off of My Clipboard / Sascha Fahl [and others] --
Privacy Primitives and Non-repudiation. Unique Ring Signatures: A Practical Construction / Matthew Franklin, Haibin Zhang --
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency / Kwangsu Lee, Dong Hoon Lee, Moti Yung --
Accumulators and U-Prove Revocation / Tolga Acar, Sherman S.M. Chow, Lan Nguyen --
Anonymity. Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy / Johannes Buchmann, Denise Demirel, Jeroen van de Graaf --
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems / Andy Rupp [and others] --
Hardware Security. Coupon Collector's Problem for Fault Analysis against AES --
High Tolerance for Noisy Fault Injections / Yu Sasaki [and others] --
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study / Jonas Maebe [and others] --
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards / Yuanyuan Zhou [and others]. Secure Computation and Secret Sharing. Securely Solving Simple Combinatorial Graph Problems / Abdelrahaman Aly [and others] --
Parallel and Dynamic Searchable Symmetric Encryption / Seny Kamara, Charalampos Papamanthou --
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits / Thomas Schneider, Michael Zohner --
Invited Talk. The Untapped Potential of Trusted Execution Environments on Mobile Devices / N. Asokan, Jan-Erik Ekberg, Kari Kostiainen --
Authentication Attacks and Countermeasures. Stark / Tilo Müller [and others] --
Risks of Offline Verify PIN on Contactless Cards / Martin Emms, Budi Arief, Nicholas Little, Aad van Moorsel --
How to Attack Two-Factor Authentication Internet Banking / Manal Adham [and others] --
CAge: Taming Certificate Authorities by Inferring Restricted Scopes / James Kasten, Eric Wustrow, J. Alex Halderman. Privacy of Data and Communciation. Interdependent Privacy: Let Me Share Your Data / Gergely Biczók, Pern Hui Chia --
A Secure Submission System for Online Whistleblowing Platforms / Volker Roth [and others] --
Securing Anonymous Communication Channels under the Selective DoS Attack / Anupam Das, Nikita Borisov --
Private Data Retrieval. PIRMAP: Efficient Private Information Retrieval for MapReduce / Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan --
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates / Justin Cappos --
Posters. Three-Factor User Authentication Method Using Biometrics Challenge Response / Haruhiko Fujii, Yukio Tsuruoka --
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services / Chrystel Gaber [and others] --
Onions for Sale: Putting Privacy on the Market / Aaron Johnson, Rob Jansen, Paul Syverson --
Searchable Encryption Supporting General Boolean Expression Queries / Tarik Moataz, Abdullatif Shikfa --
A Privacy Preserving E-Payment Architecture / Aude Plateaux [and others] --
Communication Services Empowered with a Classical Chaos Based Cryptosystem / Gerard Vidal, Mikel Hernaez.
Título da Série: Lecture notes in computer science, 7859; LNCS sublibrary., SL 4,, Security and cryptology.
Outros Títulos: FC 2013
Responsabilidade: Ahmad-Reza Sadeghi (ed.).

Resumo:

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval.

Críticas

Críticas editoriais

Nielsen BookData

From the book reviews: "Edited by Ahmad-Reza Sadeghi from the Center for Advanced Security Research Darmstadt (CASED) in Germany, the volume contains selected papers that are categorized into 12 Ler mais...

 
Críticas contribuídas por usuários
Recuperando críticas GoodReas...
Recuperando comentários DOGObooks

Etiquetas

Seja o primeiro.
Confirmar esta solicitação

Você já pode ter solicitado este item. Por favor, selecione Ok se gostaria de proceder com esta solicitação de qualquer forma.

Dados Ligados


Primary Entity

<http://www.worldcat.org/oclc/857227955> # Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "857227955" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1391262489#Topic/e_commerce_e_business> ; # e-Commerce/e-business
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/1391262489#Topic/computer_science> ; # Computer Science
    schema:about <http://experiment.worldcat.org/entity/work/data/1391262489#Topic/computer_appl_in_administrative_data_processing> ; # Computer Appl. in Administrative Data Processing
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh2006002024> ; # User-centered system design
    schema:about <http://id.worldcat.org/fast/1740021> ; # User-centered system design
    schema:about <http://experiment.worldcat.org/entity/work/data/1391262489#Topic/user_computer_interface> ; # User-Computer Interface
    schema:about <http://experiment.worldcat.org/entity/work/data/1391262489#Topic/systems_and_data_security> ; # Systems and Data Security
    schema:about <http://experiment.worldcat.org/entity/work/data/1391262489#Topic/computer_security> ; # Computer Security
    schema:about <http://experiment.worldcat.org/entity/work/data/1391262489#Topic/data_encryption> ; # Data Encryption
    schema:alternateName "FC 2013" ;
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/1391262489#Meeting/fc_conference_17th_2013_okinawa_shi_japan> ; # FC (Conference) (17th : 2013 : Okinawa-shi, Japan)
    schema:datePublished "2013" ;
    schema:description "This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/1391262489#Person/sadeghi_ahmad_reza> ; # Ahmad-Reza Sadeghi
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1391262489> ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:genre "Ebook"@en ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1391262489#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary. SL 4, Security and cryptology
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1391262489#Series/lncs_sublibrary> ; # LNCS sublibrary.
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/1391262489#CreativeWork/> ;
    schema:name "Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers"@en ;
    schema:productID "857227955" ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=3093269> ;
    schema:url <http://dx.doi.org/10.1007/978-3-642-39884-1> ;
    schema:url <http://libproxy.uwinnipeg.ca/login?url=http://dx.doi.org/10.1007/978-3-642-39884-1> ;
    schema:workExample <http://worldcat.org/isbn/9783642398841> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-642-39884-1> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/857227955> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1391262489#Meeting/fc_conference_17th_2013_okinawa_shi_japan> # FC (Conference) (17th : 2013 : Okinawa-shi, Japan)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/1391262489#Place/okinawa_shi_japan> ; # Okinawa-shi, Japan)
    schema:name "FC (Conference) (17th : 2013 : Okinawa-shi, Japan)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1391262489#Person/sadeghi_ahmad_reza> # Ahmad-Reza Sadeghi
    a schema:Person ;
    schema:familyName "Sadeghi" ;
    schema:givenName "Ahmad-Reza" ;
    schema:name "Ahmad-Reza Sadeghi" ;
    .

<http://experiment.worldcat.org/entity/work/data/1391262489#Place/okinawa_shi_japan> # Okinawa-shi, Japan)
    a schema:Place ;
    schema:name "Okinawa-shi, Japan)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1391262489#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/857227955> ; # Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers
    schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/1391262489#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary. SL 4, Security and cryptology
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/857227955> ; # Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers
    schema:name "LNCS sublibrary. SL 4, Security and cryptology" ;
    .

<http://experiment.worldcat.org/entity/work/data/1391262489#Topic/computer_appl_in_administrative_data_processing> # Computer Appl. in Administrative Data Processing
    a schema:Intangible ;
    schema:name "Computer Appl. in Administrative Data Processing"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1391262489#Topic/e_commerce_e_business> # e-Commerce/e-business
    a schema:Intangible ;
    schema:name "e-Commerce/e-business"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1391262489#Topic/systems_and_data_security> # Systems and Data Security
    a schema:Intangible ;
    schema:name "Systems and Data Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1391262489#Topic/user_computer_interface> # User-Computer Interface
    a schema:Intangible ;
    schema:name "User-Computer Interface"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2006002024> # User-centered system design
    a schema:Intangible ;
    schema:name "User-centered system design"@en ;
    .

<http://id.worldcat.org/fast/1740021> # User-centered system design
    a schema:Intangible ;
    schema:name "User-centered system design"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://worldcat.org/entity/work/data/1391262489#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/857227955> ; # Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers
    .

<http://worldcat.org/isbn/9783642398841>
    a schema:ProductModel ;
    schema:isbn "3642398847" ;
    schema:isbn "9783642398841" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/857227955> ; # Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture Notes in Computer Science," ;
    .

<http://www.worldcat.org/title/-/oclc/857227955>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/857227955> ; # Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers
    schema:dateModified "2017-02-21" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Por favor, conecte-se ao WorldCat 

Não tem uma conta? Você pode facilmente criar uma conta gratuita.