Buch, Englisch, 326 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 522 g
Reihe: Security and Cryptology
12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers
Buch, Englisch, 326 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 522 g
Reihe: Security and Cryptology
ISBN: 978-3-540-85229-2
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Informatik Mensch-Maschine-Interaktion Informationsarchitektur
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Wirtschaftswissenschaften Finanzsektor & Finanzdienstleistungen Bankwirtschaft
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
Weitere Infos & Material
Attacks and Counter Measures I.- Quantifying Resistance to the Sybil Attack.- Evaluating the Wisdom of Crowds in Assessing Phishing Websites.- Don’t Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes.- An Efficient Deniable Key Exchange Protocol (Extended Abstract).- Revisiting Pairing Based Group Key Exchange.- Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups.- A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.- Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents.- PBS: Private Bartering Systems.- Breaking Legacy Banking Standards with Special-Purpose Hardware.- ePassport: Securing International Contacts with Contactless Chips.- Good Variants of HB?+? Are Hard to Find.- Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract).- Attacks and Counter-Measures II.- Weighing Down “The Unbearable Lightness of PIN Cracking”.- Phishwish: A Stateless Phishing Filter Using Minimal Rules.- Competition and Fraud in Online Advertising Markets.- Identity Theft: Much Too Easy? A Study of Online Systems in Norway.- A Proof of Concept Attack against Norwegian Internet Banking Systems.- Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash.- Proactive RSA with Non-interactive Signing.- Fair Traceable Multi-Group Signatures.- Identity-Based Online/Offline Encryption.- Countermeasures against Government-Scale Monetary Forgery.- OpenPGP-Based Financial Instruments and Dispute Arbitration.- An Efficient Anonymous Credential System.- Practical Anonymous Divisible E-Cash from Bounded Accumulators.- Panel: Usable Cryptography: Manifest Destiny or Oxymoron?.- RealElectronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).- Securing Web Banking Applications.- Privacy Threats in Online Stock Quotes.- A Platform for OnBoard Credentials.- ST&E Is the Most Cost Effective Measure for Comply with Payment Card Industry (PCI) Data Security Standard.- Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization.