Financial Cryptography and Data Security

11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers

Editors:

ISBN: 978-3-540-77365-8 (Print) 978-3-540-77366-5 (Online)

Table of contents (36 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Keynote Address

    1. No Access

      Book Chapter

      Pages 1-1

      Leaving Room for the Bad Guys

  3. Payment Systems

    1. No Access

      Book Chapter

      Pages 2-14

      Vulnerabilities in First-Generation RFID-enabled Credit Cards

    2. No Access

      Book Chapter

      Pages 15-28

      Conditional E-Cash

    3. No Access

      Book Chapter

      Pages 29-44

      A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting

  4. Panel

    1. No Access

      Book Chapter

      Pages 45-45

      Panel: RFID Security and Privacy

    2. No Access

      Book Chapter

      Pages 46-49

      Position Statement in RFID S&P Panel: RFID and the Middleman

    3. No Access

      Book Chapter

      Pages 50-52

      Position Statement in RFID S&P Panel: Contactless Smart Cards

    4. No Access

      Book Chapter

      Pages 53-56

      Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure

  5. Anonymity

    1. No Access

      Book Chapter

      Pages 57-71

      A Model of Onion Routing with Provable Anonymity

    2. No Access

      Book Chapter

      Pages 72-87

      K-Anonymous Multi-party Secret Handshakes

  6. Authentication

    1. No Access

      Book Chapter

      Pages 88-103

      Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer

    2. No Access

      Book Chapter

      Pages 104-118

      Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

    3. No Access

      Book Chapter

      Pages 119-133

      On Authentication with HMAC and Non-random Properties

  7. Anonymity and Privacy

    1. No Access

      Book Chapter

      Pages 134-147

      Hidden Identity-Based Signatures

    2. No Access

      Book Chapter

      Pages 148-162

      Space-Efficient Private Search with Applications to Rateless Codes

  8. Cryptography and Commercial Transactions

    1. No Access

      Book Chapter

      Pages 163-178

      Cryptographic Securities Exchanges

    2. No Access

      Book Chapter

      Pages 179-191

      Improved Multi-party Contract Signing

    3. No Access

      Book Chapter

      Pages 192-207

      Informant: Detecting Sybils Using Incentives

  9. Financial Transactions and Web Services

    1. No Access

      Book Chapter

      Pages 208-223

      Dynamic Virtual Credit Card Numbers

    2. No Access

      Book Chapter

      Pages 224-238

      The Unbearable Lightness of PIN Cracking

previous Page of 2