跳到内容
Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers 预览资料
关闭预览资料
正在查...

Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers

著者: Ahmad-Reza Sadeghi
出版商: Berlin : Springer, 2013.
丛书: Lecture notes in computer science, 7859; LNCS sublibrary., SL 4,, Security and cryptology.
版本/格式:   电子图书 : 文献 : 会议刊物 : 英语查看所有的版本和格式
数据库:WorldCat
提要:
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections:  再读一些...
评估:

(尚未评估) 0 附有评论 - 争取成为第一个。

主题
更多类似这样的

 

在线查找

与资料的链接

在图书馆查找

&AllPage.SpinnerRetrieving; 正在查找有这资料的图书馆...

详细书目

类型/形式: Electronic books
Conference proceedings
Congresses
附加的形体格式: Printed edition:
材料类型: 会议刊物, 文献, 互联网资源
文件类型: 互联网资源, 计算机文档
所有的著者/提供者: Ahmad-Reza Sadeghi
ISBN: 9783642398841 3642398847
OCLC号码: 857227955
描述: 1 online resource (xvi, 406 pages) : illustrations.
内容: Keynote. Can Nature Help Us Solve Risk Management Issues? / William H. Saito --
Electronic Payment (Bitcoin). Quantitative Analysis of the Full Bitcoin Transaction Graph / Dorit Ron, Adi Shamir --
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk / Tyler Moore, Nicolas Christin --
Evaluating User Privacy in Bitcoin / Elli Androulaki [and others] --
Usability Aspects. The Importance of Being Earnest [In Security Warnings] / Serge Egelman, Stuart Schechter --
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing / Alexander Gallego, Nitesh Saxena, Jonathan Voris --
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication / Tiffany Hyun-Jin Kim [and others] --
Secure Computation. Practical Fully Simulatable Oblivious Transfer with Sublinear Communication / Bingsheng Zhang [and others] --
Unconditionally-Secure Robust Secret Sharing with Minimum Share Size / Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini --
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data / Marc Joye, Benoît Libert. Passwords. "Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks / David Aspinall, Mike Just --
Hey, You, Get Off of My Clipboard / Sascha Fahl [and others] --
Privacy Primitives and Non-repudiation. Unique Ring Signatures: A Practical Construction / Matthew Franklin, Haibin Zhang --
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency / Kwangsu Lee, Dong Hoon Lee, Moti Yung --
Accumulators and U-Prove Revocation / Tolga Acar, Sherman S.M. Chow, Lan Nguyen --
Anonymity. Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy / Johannes Buchmann, Denise Demirel, Jeroen van de Graaf --
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems / Andy Rupp [and others] --
Hardware Security. Coupon Collector's Problem for Fault Analysis against AES --
High Tolerance for Noisy Fault Injections / Yu Sasaki [and others] --
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study / Jonas Maebe [and others] --
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards / Yuanyuan Zhou [and others]. Secure Computation and Secret Sharing. Securely Solving Simple Combinatorial Graph Problems / Abdelrahaman Aly [and others] --
Parallel and Dynamic Searchable Symmetric Encryption / Seny Kamara, Charalampos Papamanthou --
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits / Thomas Schneider, Michael Zohner --
Invited Talk. The Untapped Potential of Trusted Execution Environments on Mobile Devices / N. Asokan, Jan-Erik Ekberg, Kari Kostiainen --
Authentication Attacks and Countermeasures. Stark / Tilo Müller [and others] --
Risks of Offline Verify PIN on Contactless Cards / Martin Emms, Budi Arief, Nicholas Little, Aad van Moorsel --
How to Attack Two-Factor Authentication Internet Banking / Manal Adham [and others] --
CAge: Taming Certificate Authorities by Inferring Restricted Scopes / James Kasten, Eric Wustrow, J. Alex Halderman. Privacy of Data and Communciation. Interdependent Privacy: Let Me Share Your Data / Gergely Biczók, Pern Hui Chia --
A Secure Submission System for Online Whistleblowing Platforms / Volker Roth [and others] --
Securing Anonymous Communication Channels under the Selective DoS Attack / Anupam Das, Nikita Borisov --
Private Data Retrieval. PIRMAP: Efficient Private Information Retrieval for MapReduce / Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan --
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates / Justin Cappos --
Posters. Three-Factor User Authentication Method Using Biometrics Challenge Response / Haruhiko Fujii, Yukio Tsuruoka --
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services / Chrystel Gaber [and others] --
Onions for Sale: Putting Privacy on the Market / Aaron Johnson, Rob Jansen, Paul Syverson --
Searchable Encryption Supporting General Boolean Expression Queries / Tarik Moataz, Abdullatif Shikfa --
A Privacy Preserving E-Payment Architecture / Aude Plateaux [and others] --
Communication Services Empowered with a Classical Chaos Based Cryptosystem / Gerard Vidal, Mikel Hernaez.
丛书名: Lecture notes in computer science, 7859; LNCS sublibrary., SL 4,, Security and cryptology.
其他题名: FC 2013
责任: Ahmad-Reza Sadeghi (ed.).

摘要:

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval.

评论

社评

出版商概要

From the book reviews: "Edited by Ahmad-Reza Sadeghi from the Center for Advanced Security Research Darmstadt (CASED) in Germany, the volume contains selected papers that are categorized into 12 再读一些...

 
用户提供的评论
正在获取GoodReads评论...
正在检索DOGObooks的评论

标签

争取是第一个!
确认申请

你可能已经申请过这份资料。如果还是想申请,请选确认。

链接数据


<http://www.worldcat.org/oclc/857227955>
library:oclcnum"857227955"
library:placeOfPublication
rdf:typeschema:Book
rdf:typeschema:MediaObject
rdf:valueUnknown value: dct
rdf:valueUnknown value: cnp
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:alternateName"FC 2013"@en
schema:bookFormatschema:EBook
schema:contributor
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1391262489>
schema:genre"Conference proceedings"@en
schema:genre"Electronic books"@en
schema:inLanguage"en"
schema:isPartOf
schema:isPartOf
schema:name"Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers"@en
schema:url
schema:workExample
schema:workExample
wdrs:describedby

Content-negotiable representations

关闭窗口

请登入WorldCat 

没有张号吗?很容易就可以 建立免费的账号.