|
" Financial cryptography and data security : "
Angelos D. Keromytis (ed.).
Document Type
|
:
|
BL
|
Record Number
|
:
|
778171
|
Doc. No
|
:
|
b598181
|
Main Entry
|
:
|
Angelos D. Keromytis (ed.).
|
Title & Author
|
:
|
Financial cryptography and data security : : 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised selected papers\ Angelos D. Keromytis (ed.).
|
Publication Statement
|
:
|
Berlin ; New York : Springer, ©2012.
|
Series Statement
|
:
|
Lecture notes in computer science, 7397.; LNCS sublibrary., SL 4,, Security and cryptology.
|
ISBN
|
:
|
3642329454
|
|
:
|
: 3642329462
|
|
:
|
: 9783642329456
|
|
:
|
: 9783642329463
|
Contents
|
:
|
Social Authentication: Harder Than It Looks / Hyoungshick Kim, John Tang and Ross Anderson --; The MVP Web-Based Authentication Framework (Short Paper) / Sonia Chiasson, Chris Deschamps, Elizabeth Stobert, Max Hlywa and Bruna Freitas Machado, et al. --; A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs / Joseph Bonneau, Sören Preibusch and Ross Anderson --; The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs / Tyler Moore, Jie Han and Richard Clayton --; Deploying Secure Multi-Party Computation for Financial Data Analysis (Short Paper) / Dan Bogdanov, Riivo Talviste and Jan Willemson --; Cryptographic Rule-Based Trading (Short Paper) / Christopher Thorpe and Steven R. Willis --; Efficient Private Proximity Testing with GSM Location Sketches / Zi Lin, Denis Foo Kune and Nicholas Hopper --; Metrics for Measuring ISP Badness: The Case of Spam (Short Paper) / Benjamin Johnson, John Chuang, Jens Grossklags and Nicolas Christin --; Congestion-Aware Path Selection for Tor / Tao Wang, Kevin Bauer, Clara Forero and Ian Goldberg --; Attacking the Washington, D.C. Internet Voting System / Scott Wolchok, Eric Wustrow, Dawn Isabel and J. Alex Halderman. Security Audits Revisited / Rainer Böhme --; Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging / Attila A. Yavuz, Peng Ning and Michael K. Reiter --; On Secure Two-Party Integer Division / Morten Dahl, Chao Ning and Tomas Toft --; A Non-interactive Range Proof with Constant Communication / Rafik Chaabouni, Helger Lipmaa and Bingsheng Zhang --; Privacy-Preserving Stream Aggregation with Fault Tolerance / T.-H. Hubert Chan, Elaine Shi and Dawn Song --; Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access (Short Paper) / Daniel Slamanig --; Privacy Enhanced Access Control for Outsourced Data Sharing / Mariana Raykova, Hang Zhao and Steven M. Bellovin --; Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers / Andres Molina-Markham, George Danezis, Kevin Fu, Prashant Shenoy and David Irwin --; Memory-Efficient Garbled Circuit Generation for Mobile Devices / Benjamin Mood, Lara Letaw and Kevin Butler --; Oblivious Decision Programs from Oblivious Transfer: Efficient Reductions / Payman Mohassel and Salman Niksefat --; UC-Secure Searchable Symmetric Encryption / Kaoru Kurosawa and Yasuhiro Ohtaki. CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm / Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi and Thomas Schneider --; A Cache Timing Attack on AES in Virtualization Environments / Michael Weiß, Benedikt Heinz and Frederic Stumpf --; Softer Smartcards: Usable Cryptographic Tokens witsfh Secure Execution / Franz Ferdinand Brasser, Sven Bugiel, Atanas Filyanov, Ahmad-Reza Sadeghi and Steffen Schulz --; The PACE AA Protocol for Machine Readable Travel Documents, and Its Security / Jens Bender, Özgür Dagdelen, Marc Fischlin and Dennis Kügler --; Oblivious Printing of Secret Messages in a Multi-party Setting / Aleksander Essex and Urs Hengartner --; Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs / Anthony Van Herrewege, Stefan Katzenbeisser, Roel Maes, Roel Peeters and Ahmad-Reza Sadeghi, et al. --; CommitCoin: Carbon Dating Commitments with Bitcoin (Short Paper) / Jeremy Clark and Aleksander Essex --; Bitter to Better --; How to Make Bitcoin a Better Currency / Simon Barber, Xavier Boyen, Elaine Shi and Ersin Uzun.
|
Abstract
|
:
|
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27-March 1, 2012. The 29 revised full papers presented were carefully selected and reviewed from 88 submissions. The papers cover all aspects of securing transactions and systems, including information assurance in the context of finance and commerce.
|
Subject
|
:
|
Data encryption (Computer science) -- Congresses.
|
Subject
|
:
|
Data protection -- Congresses.
|
Subject
|
:
|
Informatique.
|
Added Entry
|
:
|
Angelos Keromytis
|
Parallel Title
|
:
|
FC 2012
|
| |