跳到内容
Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers 预览资料
关闭预览资料
正在查...

Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers

著者: Ahmad-Reza Sadeghi
出版商: Berlin : Springer, 2013.
丛书: Lecture notes in computer science, 7859; LNCS sublibrary., SL 4,, Security and cryptology.
版本/格式:   电子图书 : 文献 : 会议刊物 : 英语查看所有的版本和格式
数据库:WorldCat
提要:
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections:  再读一些...
评估:

(尚未评估) 0 附有评论 - 争取成为第一个。

主题
更多类似这样的

 

在线查找

与资料的链接

在图书馆查找

&AllPage.SpinnerRetrieving; 正在查找有这资料的图书馆...

详细书目

类型/形式: Electronic books
Conference proceedings
Congresses
材料类型: 会议刊物, 文献, 互联网资源
文件类型: 互联网资源, 计算机文档
所有的著者/提供者: Ahmad-Reza Sadeghi
ISBN: 9783642398841 3642398847
OCLC号码: 857227955
描述: 1 online resource (xvi, 406 pages) : illustrations.
内容: Keynote. Can Nature Help Us Solve Risk Management Issues? / William H. Saito --
Electronic Payment (Bitcoin). Quantitative Analysis of the Full Bitcoin Transaction Graph / Dorit Ron, Adi Shamir --
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk / Tyler Moore, Nicolas Christin --
Evaluating User Privacy in Bitcoin / Elli Androulaki ... [et al.] --
Usability Aspects. The Importance of Being Earnest [In Security Warnings] / Serge Egelman, Stuart Schechter --
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing / Alexander Gallego, Nitesh Saxena, Jonathan Voris --
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication / Tiffany Hyun-Jin Kim ... [et al.] --
Secure Computation. Practical Fully Simulatable Oblivious Transfer with Sublinear Communication / Bingsheng Zhang ... [et al.] --
Unconditionally-Secure Robust Secret Sharing with Minimum Share Size / Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini --
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data / Marc Joye, Benoît Libert --
Passwords. "Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks / David Aspinall, Mike Just --
Hey, You, Get Off of My Clipboard / Sascha Fahl ... [et al.] --
Privacy Primitives and Non-repudiation. Unique Ring Signatures: A Practical Construction / Matthew Franklin, Haibin Zhang --
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency / Kwangsu Lee, Dong Hoon Lee, Moti Yung --
Accumulators and U-Prove Revocation / Tolga Acar, Sherman S. M. Chow, Lan Nguyen --
Anonymity. Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy / Johannes Buchmann, Denise Demirel, Jeroen van de Graaf --
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems / Andy Rupp ... [et al.] --
Hardware Security. Coupon Collector's Problem for Fault Analysis against AES --
High Tolerance for Noisy Fault Injections / Yu Sasaki ... [et al.] --
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study / Jonas Maebe ... [et al.] --
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards / Yuanyuan Zhou ... [et al.] --
Secure Computation and Secret Sharing. Securely Solving Simple Combinatorial Graph Problems / Abdelrahaman Aly ... [et al.] --
Parallel and Dynamic Searchable Symmetric Encryption / Seny Kamara, Charalampos Papamanthou --
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits / Thomas Schneider, Michael Zohner --
Invited Talk. The Untapped Potential of Trusted Execution Environments on Mobile Devices / N. Asokan, Jan-Erik Ekberg, Kari Kostiainen --
Authentication Attacks and Countermeasures. Stark / Tilo Müller ... [et al.] --
Risks of Offline Verify PIN on Contactless Cards / Martin Emms, Budi Arief, Nicholas Little, Aad van Moorsel --
How to Attack Two-Factor Authentication Internet Banking / Manal Adham ... [et al.] --
CAge: Taming Certificate Authorities by Inferring Restricted Scopes / James Kasten, Eric Wustrow, J. Alex Halderman --
Privacy of Data and Communciation. Interdependent Privacy: Let Me Share Your Data / Gergely Biczók, Pern Hui Chia --
A Secure Submission System for Online Whistleblowing Platforms / Volker Roth ... [et al.] --
Securing Anonymous Communication Channels under the Selective DoS Attack / Anupam Das, Nikita Borisov --
Private Data Retrieval. PIRMAP: Efficient Private Information Retrieval for MapReduce / Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan --
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates / Justin Cappos --
Posters. Three-Factor User Authentication Method Using Biometrics Challenge Response / Haruhiko Fujii, Yukio Tsuruoka --
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services / Chrystel Gaber ... [et al.] --
Onions for Sale: Putting Privacy on the Market / Aaron Johnson, Rob Jansen, Paul Syverson --
Searchable Encryption Supporting General Boolean Expression Queries / Tarik Moataz, Abdullatif Shikfa --
A Privacy Preserving E-Payment Architecture / Aude Plateaux ... [et al.] --
Communication Services Empowered with a Classical Chaos Based Cryptosystem / Gerard Vidal, Mikel Hernaez.
丛书名: Lecture notes in computer science, 7859; LNCS sublibrary., SL 4,, Security and cryptology.
其他题名: FC 2013
责任: Ahmad-Reza Sadeghi (ed.).
更多信息:

摘要:

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval.

评论

用户提供的评论
正在获取GoodReads评论...
正在检索DOGObooks的评论

标签

争取是第一个!
确认申请

你可能已经申请过这份资料。如果还是想申请,请选确认。

链接数据


<http://www.worldcat.org/oclc/857227955>
library:oclcnum"857227955"
library:placeOfPublication
owl:sameAs<info:oclcnum/857227955>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1391262489>
schema:genre"Conference proceedings"
schema:genre"Electronic books."
schema:genre"Conference proceedings."
schema:inLanguage"en"
schema:name"Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers"
schema:name"FC 2013"
schema:url
schema:url
schema:workExample
schema:workExample

Content-negotiable representations

关闭窗口

请登入WorldCat 

没有张号吗?很容易就可以 建立免费的账号.