Financial Cryptography and Data Security

15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers

Editors:

ISBN: 978-3-642-27575-3 (Print) 978-3-642-27576-0 (Online)

Table of contents (26 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Finacial Cryptography and Data Security (FC 2011)

    1. No Access

      Book Chapter

      Pages 1-15

      Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data

    2. No Access

      Book Chapter

      Pages 16-30

      It’s All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice

    3. No Access

      Book Chapter

      Pages 31-46

      Evaluating the Privacy Risk of Location-Based Services

    4. No Access

      Book Chapter

      Pages 47-61

      Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance

    5. No Access

      Book Chapter

      Pages 62-76

      Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection

    6. No Access

      Book Chapter

      Pages 77-84

      Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools

    7. No Access

      Book Chapter

      Pages 85-92

      A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper)

    8. No Access

      Book Chapter

      Pages 93-101

      Impeding Individual User Profiling in Shopper Loyalty Programs

    9. No Access

      Book Chapter

      Pages 102-112

      Beyond Risk-Based Access Control: Towards Incentive-Based Access Control

    10. No Access

      Book Chapter

      Pages 113-126

      Authenticated Key Exchange under Bad Randomness

    11. No Access

      Book Chapter

      Pages 127-140

      Oblivious Outsourced Storage with Delegation

    12. No Access

      Book Chapter

      Pages 141-157

      Homomorphic Signatures for Digital Photographs

    13. No Access

      Book Chapter

      Pages 158-172

      Revisiting the Computational Practicality of Private Information Retrieval

    14. No Access

      Book Chapter

      Pages 173-181

      Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper)

    15. No Access

      Book Chapter

      Pages 182-189

      A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time

    16. No Access

      Book Chapter

      Pages 190-204

      An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs

    17. No Access

      Book Chapter

      Pages 205-219

      Peeling Away Layers of an RFID Security System

    18. No Access

      Book Chapter

      Pages 220-234

      Might Financial Cryptography Kill Financial Innovation? – The Curious Case of EMV

    19. No Access

      Book Chapter

      Pages 235-249

      hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers

    20. No Access

      Book Chapter

      Pages 250-259

      Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper)

previous Page of 2