Financial Cryptography and Data Security

17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers

Editors:

ISBN: 978-3-642-39883-4 (Print) 978-3-642-39884-1 (Online)

Table of contents (39 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Keynote

    1. No Access

      Book Chapter

      Pages 1-5

      Can Nature Help Us Solve Risk Management Issues?

  3. Electronic Payment (Bitcoin)

    1. No Access

      Book Chapter

      Pages 6-24

      Quantitative Analysis of the Full Bitcoin Transaction Graph

    2. No Access

      Book Chapter

      Pages 25-33

      Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk

    3. No Access

      Book Chapter

      Pages 34-51

      Evaluating User Privacy in Bitcoin

  4. Usability Aspects

    1. No Access

      Book Chapter

      Pages 52-59

      The Importance of Being Earnest [In Security Warnings]

    2. No Access

      Book Chapter

      Pages 60-68

      Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing

    3. No Access

      Book Chapter

      Pages 69-77

      RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication

  5. Secure Computation

    1. No Access

      Book Chapter

      Pages 78-95

      Practical Fully Simulatable Oblivious Transfer with Sublinear Communication

    2. No Access

      Book Chapter

      Pages 96-110

      Unconditionally-Secure Robust Secret Sharing with Minimum Share Size

    3. No Access

      Book Chapter

      Pages 111-125

      A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data

  6. Passwords

    1. No Access

      Book Chapter

      Pages 126-143

      “Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks

    2. No Access

      Book Chapter

      Pages 144-161

      Hey, You, Get Off of My Clipboard

  7. Privacy Primitives and Non-repudiation

    1. No Access

      Book Chapter

      Pages 162-170

      Unique Ring Signatures: A Practical Construction

    2. No Access

      Book Chapter

      Pages 171-188

      Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency

    3. No Access

      Book Chapter

      Pages 189-196

      Accumulators and U-Prove Revocation

  8. Anonymity

    1. No Access

      Book Chapter

      Pages 197-204

      Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy

    2. No Access

      Book Chapter

      Pages 205-212

      P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems

  9. Hardware Security

    1. No Access

      Book Chapter

      Pages 213-220

      Coupon Collector’s Problem for Fault Analysis against AES — High Tolerance for Noisy Fault Injections

    2. No Access

      Book Chapter

      Pages 221-229

      Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study

    3. No Access

      Book Chapter

      Pages 230-238

      On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards

previous Page of 2