Financial Cryptography and Data Security

14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers

Editors:

ISBN: 978-3-642-14576-6 (Print) 978-3-642-14577-3 (Online)

Table of contents (43 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-1

    Constructive Cryptography – A Primer

  3. No Access

    Book Chapter

    Pages 2-2

    Security Mechanisms with Selfish Players in Wireless Networks

  4. No Access

    Book Chapter

    Pages 3-3

    Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory

  5. No Access

    Book Chapter

    Pages 4-19

    Multichannel Protocols to Prevent Relay Attacks

  6. No Access

    Book Chapter

    Pages 20-34

    A Traceability Attack against e-Passports

  7. No Access

    Book Chapter

    Pages 35-50

    Secure Computation with Fixed-Point Numbers

  8. No Access

    Book Chapter

    Pages 51-65

    Implementing a High-Assurance Smart-Card OS

  9. No Access

    Book Chapter

    Pages 66-81

    Unlinkable Priced Oblivious Transfer with Rechargeable Wallets

  10. No Access

    Book Chapter

    Pages 82-97

    Multiple Denominations in E-cash with Compact Transaction Data

  11. No Access

    Book Chapter

    Pages 98-113

    What’s in a Name?

  12. No Access

    Book Chapter

    Pages 114-128

    Cryptographic Protocol Analysis of AN.ON

  13. No Access

    Book Chapter

    Pages 129-142

    A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys

  14. No Access

    Book Chapter

    Pages 143-159

    Practical Private Set Intersection Protocols with Linear Complexity

  15. No Access

    Book Chapter

    Pages 160-174

    Design and Implementation of a Key-Lifecycle Management System

  16. No Access

    Book Chapter

    Pages 175-191

    Measuring the Perpetrators and Funders of Typosquatting

  17. No Access

    Book Chapter

    Pages 192-206

    A Learning-Based Approach to Reactive Security

  18. No Access

    Book Chapter

    Pages 207-221

    Embedded SFE: Offloading Server and Network Using Hardware Tokens

  19. No Access

    Book Chapter

    Pages 222-237

    The Phish-Market Protocol: Securely Sharing Attack Data between Competitors

  20. No Access

    Book Chapter

    Pages 238-256

    Building Incentives into Tor

  21. No Access

    Book Chapter

    Pages 257-271

    Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections

previous Page of 3