
Vinkkaa tuotetta kavereillesi:
Financial Cryptography and Data Security: 15th International Conference, Fc 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers - Lecture Notes in Computer Science / Security and Cryptology
George Danezis
Financial Cryptography and Data Security: 15th International Conference, Fc 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers - Lecture Notes in Computer Science / Security and Cryptology
George Danezis
Jacket Description/Back: This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St. Lucia, in February/March 2011. The 16 revised full papers and 10 revised short papers presented were carefully reviewed and selected from 65 initial submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on fundamental and applied real-world deployments on all aspects surrounding commerce security; as well as on systems security and inter-disciplinary efforts. Table of Contents: Finacial Cryptography and Data Security (FC 2011) -- Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data / Rainer BOhme, Stefanie POtzsch -- It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice / Nicolas Christin, Serge Egelman, Timothy Vidas, Jens Grossklags -- Evaluating the Privacy Risk of Location-Based Services / Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux -- Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance / Jeremy Clark, Urs Hengartner -- Malice versus AN. ON: Possible Risks of Missing Replay and Integrity Protection / Benedikt Westermann, Dogan Kesdogan -- Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools / Jay Novak, Jonathan Stribley, Kenneth Meagher, J. Alex Halderman -- A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper) / Ben Palmer, Kris Bubendorfer, Ian Welch -- Impeding Individual User Profiling in Shopper Loyalty Programs / Philip Marquardt, David Dagon, Patrick Traynor -- Beyond Risk-Based Access Control: Towards Incentive-Based Access Control / Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp -- Authenticated Key Exchange under Bad Randomness / Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang -- Oblivious Outsourced Storage with Delegation / Martin Franz, Peter Williams, Bogdan Carbunar, Stefan Katzenbeisser, Andreas Peter, Radu Sion, Miroslava Sotakova -- Homomorphic Signatures for Digital Photographs / Rob Johnson, Leif Walsh, Michael Lamb -- Revisiting the Computational Practicality of Private Information Retrieval / Femi Olumofin, Ian Goldberg -- Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper) / Mohammed Ashraful Alam Tuhin, Reihaneh Safavi-Naini -- A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time / Oliver Spycher, Reto Koenig, Rolf Haenni, Michael SchlApfer -- An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs / Ulrich RUhrmair, Christian Jaeger, Michael Algasinger -- Peeling Away Layers of an RFID Security System / Henryk PlOtz, Karsten Nohl -- Might Financial Cryptography Kill Financial Innovation? The Curious Case of EMV / Ross Anderson, Mike Bond, Omar Choudary, Steven J. Murdoch, Frank Stajano -- hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers / Shujun Li, Ahmad-Reza Sadeghi, SOren Heisrath, Roland Schmitz, Junaid Jameel Ahmad -- Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper) / Christopher Soghoian, Sid Stamm -- Proximax: Measurement-Driven Proxy Dissemination (Short Paper) / Damon McCoy, Jose Andre Morales, Kirill Levchenko -- BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper) / Peter Lofgren, Nicholas Hopper -- Towards Secure Bioinformatics Services (Short Paper) / Martin Franz, Bjorn Deiseroth, Kay Hamacher, Somesh Jha, Stefen Katzenbeisser, Heike SchrOder -- Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications / Theodoor Scholte, Davide Balzarotti, Engin Kirda -- Re-evaluating the Wisdom of Crowds in Assessing Web Security / Pern Hui Chia, Svein Johan Knapskog -- Mercury: Recovering Forgotten Passwords Using Personal Devices / Mohammad Mannan, David Barrera, Carson D. Brown, David Lie, Paul C. van Oorschot -- Author Index.
334 pages, 72 black & white illustrations, biography
Media | Kirjat Paperback Book (Kirja pehmeillä kansilla ja liimatulla selällä) |
Julkaisupäivämäärä | maanantai 16. tammikuuta 2012 |
ISBN13 | 9783642275753 |
Tuottaja | Springer-Verlag Berlin and Heidelberg Gm |
Sivujen määrä | 334 |
Mitta | 155 × 235 × 20 mm · 521 g |
Kieli | French |
Toimittaja | Danezis, George |
Lisää tuotteita George Danezis
Katso kaikki joka sisältää George Danezis ( Esim. Paperback Book )