Buch, Englisch, Band 3110, 286 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 458 g
8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers
Buch, Englisch, Band 3110, 286 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 458 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-22420-4
Verlag: Springer Berlin Heidelberg
The8thAnnualFinancialCryptographyConferencewasheldduring9–12Feb- ary 2004 in Key West, Florida, USA. The conference was organized by the - ternational Financial Cryptography Association (IFCA). The program committee, which comprised 25 members, reviewed 78 subm- sions, of which only 17 were accepted for presentation at the conference. This year’s conference di?ered somewhat from those of previous years in its c- sideration of papers devoted to implementation, rather than purely conceptual research; one of these submissions was presented at the conference. This rep- sented a movement in the conference toward practical problems and real-world perspectives as a complement to more traditional academic forms of research. In this spirit, the program included a number of excellent invited speakers. In the opening talk of the conference, Jack Selby threw down the gauntlet, - scribing some of the achievements of the PayPal system, but also enumerating reasons for the failures of many elegant e-cash schemes in the past. Ron Rivest, in contrast, described an emerging success in the cleverly conceived Peppercoin micropayment system. Jacques Stern enlightened us with his experience in the cryptographic design of banking cards in France. Simon Pugh unveiled some - tailsofanewgenerationofwirelesscreditcard. Finally,indeferenceto themany consumers in the world lacking either techno-savvy or technological resources that we often too easily take for granted, Jon Peha described a ?elded banking system that avoids reliance on conventional ?nancial infrastructures. Thanks to all of these speakers for rounding out the conference with their expertise and breadth of vision.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Wirtschaftswissenschaften Finanzsektor & Finanzdienstleistungen Bankwirtschaft
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Betriebssysteme Windows Betriebssysteme
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
Weitere Infos & Material
Invited Talks.- Analyzing the Success and Failure of Recent e-Payment Schemes.- Peppercoin Micropayments.- Loyalty and Micropayment Systems.- Microcredits for Verifiable Foreign Service Provider Metering.- A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves.- User Authentication.- Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop.- Call Center Customer Verification by Query-Directed Passwords.- Invited Talks.- Cryptography and the French Banking Cards: Past, Present, Future.- PayPass Security and Risk.- e-Voting.- The Vector-Ballot e-Voting Approach.- Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast.- Panel Session: Building Usable Security Systems.- Usability and Acceptability of Biometric Security Systems.- Mental Models of Computer Security.- Visualization Tools for Security Administrators.- Secure Interaction Design.- Invited Talk.- Bringing Payment Technology to the Unbanked.- Auctions and Lotteries.- Interleaving Cryptography and Mechanism Design.- Secure Generalized Vickrey Auction without Third-party Servers.- Electronic National Lotteries.- Identity-Based Chameleon Hash and Applications.- Game Theoretic and Cryptographic Tools.- Selecting Correlated Random Actions.- An Efficient and Usable Multi-show Non-transferable Anonymous Credential System.- The Ephemeral Pairing Problem.- Mix Networks and Anonymous Communications.- Mixminion: Strong Anonymity for Financial Cryptography.- Practical Anonymity for the Masses with MorphMix.- Timing Attacks in Low-Latency Mix Systems.- Provable Unlinkability against Traffic Analysis.