Financial cryptography and data security : 14th international conference, FC 2010, Tenerife, Canary Islands, Spain, January 25 - 28, 2010 ; revised selected papers (English)
- New search for: FC
- Further information on FC:
- http://d-nb.info/gnd/16172934-4
- New search for: Sion, Radu
- New search for: FC
- Further information on FC:
- http://d-nb.info/gnd/16172934-4
2010
-
ISBN:
- Conference Proceedings / Electronic Resource
-
Title:Financial cryptography and data security : 14th international conference, FC 2010, Tenerife, Canary Islands, Spain, January 25 - 28, 2010 ; revised selected papers
-
Contributors:Sion, Radu / FC
-
Conference:FC ; 14 ; 2010 ; Tenerife
Financial Cryptography and Data Security International Conference ; 14 ; 2010 ; Tenerife -
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin [u.a.]
-
Publication date:2010
-
Size:Online-Ressource (XII, 432 S.)
-
Remarks:Campusweiter Zugriff (Universität Hannover). - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots.
Literaturangaben -
ISBN:
-
DOI:
-
Type of media:Conference Proceedings
-
Type of material:Electronic Resource
-
Language:English
- New search for: 85.20 / 54.38 / 54.62
- Further information on Basic classification
- New search for: 332.178
- Further information on Dewey Decimal Classification
-
Keywords:
-
Classification:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Constructive Cryptography - A PrimerMaurer, U. et al. | 2010
- 2
-
Security Mechanisms with Selfish Players in Wireless NetworksHubaux, J.-P. et al. | 2010
- 3
-
Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security LaboratoryCranor, L.F. et al. | 2010
- 4
-
Multichannel Protocols to Prevent Relay AttacksStajano, F. / Wong, F.-L. / Christianson, B. et al. | 2010
- 20
-
A Traceability Attack against e-PassportsChothia, T. / Smirnov, V. et al. | 2010
- 35
-
Secure Computation with Fixed-Point NumbersCatrina, O. / Saxena, A. et al. | 2010
- 51
-
Implementing a High-Assurance Smart-Card OSKarger, P.A. / Toll, D.C. / Palmer, E.R. / McIntosh, S.K. / Weber, S. / Edwards, J.W. et al. | 2010
- 66
-
Unlinkable Priced Oblivious Transfer with Rechargeable WalletsCamenisch, J. / Dubovitskaya, M. / Neven, G. et al. | 2010
- 82
-
Multiple Denominations in E-cash with Compact Transaction DataCanard, S. / Gouget, A. et al. | 2010
- 98
-
What's in a Name? Evaluating Statistical Attacks on Personal Knowledge QuestionsBonneau, J. / Just, M. / Matthews, G. et al. | 2010
- 114
-
Cryptographic Protocol Analysis of AN.ONWestermann, B. / Wendolsky, R. / Pimenidis, L. / Kesdogan, D. et al. | 2010
- 129
-
A CDH-Based Ring Signature Scheme with Short Signatures and Public KeysSchage, S. / Schwenk, J. et al. | 2010
- 143
-
Practical Private Set Intersection Protocols with Linear ComplexityDe Cristofaro, E. / Tsudik, G. et al. | 2010
- 160
-
Design and Implementation of a Key-Lifecycle Management SystemBjorkqvist, M. / Cachin, C. / Haas, R. / Hu, X.-Y. / Kurmus, A. / Pawlitzek, R. / Vukolic, M. et al. | 2010
- 175
-
Measuring the Perpetrators and Funders of TyposquattingMoore, T. / Edelman, B. et al. | 2010
- 192
-
A Learning-Based Approach to Reactive SecurityBarth, A. / Rubinstein, B.I.P. / Sundararajan, M. / Mitchell, J.C. / Song, D. / Bartlett, P.L. et al. | 2010
- 207
-
Embedded SFE: Offloading Server and Network Using Hardware TokensJarvinen, K. / Kolesnikov, V. / Sadeghi, A.-R. / Schneider, T. et al. | 2010
- 222
-
The Phish-Market Protocol: Securely Sharing Attack Data between CompetitorsMoran, T. / Moore, T. et al. | 2010
- 238
-
Building Incentives into TorNgan, T.-W. / Dingledine, R. / Wallach, D.S. et al. | 2010
- 257
-
Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot ElectionsKiayias, A. / Yung, M. et al. | 2010
- 272
-
Automatically Preparing Safe SQL QueriesBisht, P. / Sistla, A.P. / Venkatakrishnan, V.N. et al. | 2010
- 289
-
PKI Layer Cake: New Collision Attacks against the Global X.509 InfrastructureKaminsky, D. / Patterson, M.L. / Sassaman, L. et al. | 2010
- 304
-
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting SecrecyChen, X. / Zhang, F. / Tian, H. / Wu, Q. / Mu, Y. / Kim, J. / Kim, K. et al. | 2010
- 312
-
Designing for Audit: A Voting Machine with a Tiny TCBGardner, R.W. / Garera, S. / Rubin, A.D. et al. | 2010
- 320
-
Attacking of SmartCard-Based Banking Applications with JavaScript-Based RootkitsBussmeyer, D. / Grobert, F. / Schwenk, J. / Wegener, C. et al. | 2010
- 328
-
Security Applications of Diodes with Unique Current-Voltage CharacteristicsRuhrmair, U. / Jaeger, C. / Hilgers, C. / Algasinger, M. / Csaba, G. / Stutzmann, M. et al. | 2010
- 336
-
Verified by Visa and MasterCard SecureCode: or, How Not to Design AuthenticationMurdoch, S.J. / Anderson, R. et al. | 2010
- 343
-
All You Can Eat or Breaking a Real-World Contactless Payment SystemKasper, T. / Silbermann, M. / Paar, C. et al. | 2010
- 351
-
Shoulder-Surfing Safe Login in a Partially Observable Attacker ModelPerkovic, T. / Cagalj, M. / Saxena, N. et al. | 2010
- 359
-
Using Sphinx to Improve Onion Routing Circuit ConstructionKate, A. / Goldberg, I. et al. | 2010
- 367
-
Secure Multiparty AESDamgard, I. / Keller, M. et al. | 2010
- 375
-
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical AnalysisGuajardo, J. / Mennink, B. / Schoenmakers, B. et al. | 2010
- 383
-
On Robust Key Agreement Based on Public Key AuthenticationHao, F. et al. | 2010
- 391
-
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line GuessingGroza, B. / Minea, M. et al. | 2010
- 400
-
Signatures of ReputationBethencourt, J. / Shi, E. / Song, D. et al. | 2010
- 408
-
Intention-Disguised Algorithmic TradingYuen, W. / Syverson, P. / Liu, Z. / Thorpe, C. et al. | 2010
- 416
-
When Information Improves Information SecurityGrossklags, J. / Johnson, B. / Christin, N. et al. | 2010
- 424
-
BetterThanPin: Empowering Users to Fight PhishingTan, T.G. et al. | 2010
- 425
-
Certification Intermediaries and the AlternativeChia, P.H. et al. | 2010
- 426
-
SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge ProofsGrzonkowski, S. et al. | 2010
- 427
-
Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc NetworksCaballero-Gil, P. / Molina-Gil, J. / Caballero-Gil, C. / Hernandez-Goya, C. et al. | 2010
- 428
-
Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic ProtocolsGeorgieva, L. et al. | 2010
- 429
-
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted ComputersLi, S. / Sadeghi, A.-R. / Schmitz, R. et al. | 2010