跳至内容
Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers 線上預覽
關閉線上預覽
正在查...

Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers

作者: Ahmad-Reza Sadeghi
出版商: Berlin : Springer, 2013.
叢書: Lecture notes in computer science, 7859; LNCS sublibrary., SL 4,, Security and cryptology.
版本/格式:   電子書 : 文獻 : 會議刊物 : 英語所有版本和格式的總覽
資料庫:WorldCat
提要:
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections:  再讀一些...
評定級別:

(尚未評分) 0 附有評論 - 成爲第一個。

主題
更多類似這樣的

 

在線上查詢

與資料的連結

在圖書館查詢

&AllPage.SpinnerRetrieving; 正在查詢有此資料的圖書館...

詳細書目

類型/形式: Electronic books
Conference proceedings
Congresses
資料類型: 會議刊物, 文獻, 網際網路資源
文件類型: 網路資源, 電腦資料
所有的作者/貢獻者: Ahmad-Reza Sadeghi
ISBN: 9783642398841 3642398847
OCLC系統控制編碼: 857227955
描述: 1 online resource (xvi, 406 pages) : illustrations.
内容: Keynote. Can Nature Help Us Solve Risk Management Issues? / William H. Saito --
Electronic Payment (Bitcoin). Quantitative Analysis of the Full Bitcoin Transaction Graph / Dorit Ron, Adi Shamir --
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk / Tyler Moore, Nicolas Christin --
Evaluating User Privacy in Bitcoin / Elli Androulaki ... [et al.] --
Usability Aspects. The Importance of Being Earnest [In Security Warnings] / Serge Egelman, Stuart Schechter --
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing / Alexander Gallego, Nitesh Saxena, Jonathan Voris --
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication / Tiffany Hyun-Jin Kim ... [et al.] --
Secure Computation. Practical Fully Simulatable Oblivious Transfer with Sublinear Communication / Bingsheng Zhang ... [et al.] --
Unconditionally-Secure Robust Secret Sharing with Minimum Share Size / Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini --
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data / Marc Joye, Benoît Libert --
Passwords. "Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks / David Aspinall, Mike Just --
Hey, You, Get Off of My Clipboard / Sascha Fahl ... [et al.] --
Privacy Primitives and Non-repudiation. Unique Ring Signatures: A Practical Construction / Matthew Franklin, Haibin Zhang --
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency / Kwangsu Lee, Dong Hoon Lee, Moti Yung --
Accumulators and U-Prove Revocation / Tolga Acar, Sherman S. M. Chow, Lan Nguyen --
Anonymity. Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy / Johannes Buchmann, Denise Demirel, Jeroen van de Graaf --
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems / Andy Rupp ... [et al.] --
Hardware Security. Coupon Collector's Problem for Fault Analysis against AES --
High Tolerance for Noisy Fault Injections / Yu Sasaki ... [et al.] --
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study / Jonas Maebe ... [et al.] --
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards / Yuanyuan Zhou ... [et al.] --
Secure Computation and Secret Sharing. Securely Solving Simple Combinatorial Graph Problems / Abdelrahaman Aly ... [et al.] --
Parallel and Dynamic Searchable Symmetric Encryption / Seny Kamara, Charalampos Papamanthou --
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits / Thomas Schneider, Michael Zohner --
Invited Talk. The Untapped Potential of Trusted Execution Environments on Mobile Devices / N. Asokan, Jan-Erik Ekberg, Kari Kostiainen --
Authentication Attacks and Countermeasures. Stark / Tilo Müller ... [et al.] --
Risks of Offline Verify PIN on Contactless Cards / Martin Emms, Budi Arief, Nicholas Little, Aad van Moorsel --
How to Attack Two-Factor Authentication Internet Banking / Manal Adham ... [et al.] --
CAge: Taming Certificate Authorities by Inferring Restricted Scopes / James Kasten, Eric Wustrow, J. Alex Halderman --
Privacy of Data and Communciation. Interdependent Privacy: Let Me Share Your Data / Gergely Biczók, Pern Hui Chia --
A Secure Submission System for Online Whistleblowing Platforms / Volker Roth ... [et al.] --
Securing Anonymous Communication Channels under the Selective DoS Attack / Anupam Das, Nikita Borisov --
Private Data Retrieval. PIRMAP: Efficient Private Information Retrieval for MapReduce / Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan --
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates / Justin Cappos --
Posters. Three-Factor User Authentication Method Using Biometrics Challenge Response / Haruhiko Fujii, Yukio Tsuruoka --
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services / Chrystel Gaber ... [et al.] --
Onions for Sale: Putting Privacy on the Market / Aaron Johnson, Rob Jansen, Paul Syverson --
Searchable Encryption Supporting General Boolean Expression Queries / Tarik Moataz, Abdullatif Shikfa --
A Privacy Preserving E-Payment Architecture / Aude Plateaux ... [et al.] --
Communication Services Empowered with a Classical Chaos Based Cryptosystem / Gerard Vidal, Mikel Hernaez.
叢書名: Lecture notes in computer science, 7859; LNCS sublibrary., SL 4,, Security and cryptology.
其他題名: FC 2013
責任: Ahmad-Reza Sadeghi (ed.).
更多資訊:

摘要:

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval.

評論

讀者提供的評論
正在擷取GoodReads評論...
正在擷取DOGObooks的評論

標籤

成爲第一個
確認申請

你可能已經申請過這份資料。若還是想申請,請選確認。

連結資料


<http://www.worldcat.org/oclc/857227955>
library:oclcnum"857227955"
library:placeOfPublication
owl:sameAs<info:oclcnum/857227955>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1391262489>
schema:genre"Conference proceedings"
schema:genre"Electronic books."
schema:genre"Conference proceedings."
schema:inLanguage"en"
schema:name"Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised selected papers"
schema:name"FC 2013"
schema:url
schema:url
schema:workExample
schema:workExample

Content-negotiable representations

關閉視窗

請登入WorldCat 

没有帳號嗎?你可很容易的 建立免費的帳號.