Financial Cryptography and Data Security

14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers

  • Radu Sion
Conference proceedings FC 2010

DOI: 10.1007/978-3-642-14577-3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6052)

Table of contents (43 papers)

  1. Front Matter
  2. Multichannel Protocols to Prevent Relay Attacks
    Frank Stajano, Ford-Long Wong, Bruce Christianson
    Pages 4-19
  3. A Traceability Attack against e-Passports
    Tom Chothia, Vitaliy Smirnov
    Pages 20-34
  4. Secure Computation with Fixed-Point Numbers
    Octavian Catrina, Amitabh Saxena
    Pages 35-50
  5. Implementing a High-Assurance Smart-Card OS
    Paul A. Karger, David C. Toll, Elaine R. Palmer, Suzanne K. McIntosh, Samuel Weber, Jonathan W. Edwards
    Pages 51-65
  6. Unlinkable Priced Oblivious Transfer with Rechargeable Wallets
    Jan Camenisch, Maria Dubovitskaya, Gregory Neven
    Pages 66-81
  7. Multiple Denominations in E-cash with Compact Transaction Data
    Sébastien Canard, Aline Gouget
    Pages 82-97
  8. What’s in a Name?
    Joseph Bonneau, Mike Just, Greg Matthews
    Pages 98-113
  9. Cryptographic Protocol Analysis of AN.ON
    Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidis, Dogan Kesdogan
    Pages 114-128
  10. Practical Private Set Intersection Protocols with Linear Complexity
    Emiliano De Cristofaro, Gene Tsudik
    Pages 143-159
  11. Design and Implementation of a Key-Lifecycle Management System
    Mathias Björkqvist, Christian Cachin, Robert Haas, Xiao-Yu Hu, Anil Kurmus, René Pawlitzek et al.
    Pages 160-174
  12. Measuring the Perpetrators and Funders of Typosquatting
    Tyler Moore, Benjamin Edelman
    Pages 175-191
  13. A Learning-Based Approach to Reactive Security
    Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett
    Pages 192-206
  14. Embedded SFE: Offloading Server and Network Using Hardware Tokens
    Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
    Pages 207-221
  15. Building Incentives into Tor
    Tsuen-Wan “Johnny” Ngan, Roger Dingledine, Dan S. Wallach
    Pages 238-256

Other volumes

  1. Financial Cryptography and Data Security
    14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers
  2. Financial Cryptography and Data Security
    FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers

About these proceedings

Keywords

anonymous credentials authentication automated reasoning bilinear gruop cryptographic protocol cryptography data security encryption information security privacy secret sharing symbolic evaluation

Editors and affiliations

  • Radu Sion
    • 1
  1. 1.Computer Science Department, Stony BrookStony Brook UniversityUSA

Bibliographic information

  • Copyright Information IFCA/Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-14576-6
  • Online ISBN 978-3-642-14577-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349