Financial Cryptography and Data Security

13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers

  • Roger Dingledine
  • Philippe Golle
Conference proceedings FC 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5628)

Table of contents

  1. Front Matter
  2. Economics of Information Security I

    1. Debin Liu, XiaoFeng Wang, L. Jean Camp
      Pages 1-16
  3. Anonymity and Privacy I

    1. Aggelos Kiayias, Bülent Yener, Moti Yung
      Pages 32-50
    2. Susan Landau, Hubert Le Van Gong, Robin Wilton
      Pages 51-70
    3. M. Eric Johnson
      Pages 71-89
  4. Private Computation

    1. Jan Camenisch, Gregory M. Zaverucha
      Pages 108-127
    2. Justin Brickell, Vitaly Shmatikov
      Pages 128-147
  5. Economics of Information Security II

    1. Christos Ioannidis, David Pym, Julian Williams
      Pages 148-166
    2. Neal Fultz, Jens Grossklags
      Pages 167-183
  6. Authentication and Identification

    1. Saar Drimer, Steven J. Murdoch, Ross Anderson
      Pages 184-200
    2. Deepak Vijaywargi, Dave Lewis, Darko Kirovski
      Pages 222-229
  7. Panel

    1. Cormac Herley, P. C. van Oorschot, Andrew S. Patrick
      Pages 230-237
  8. Fraud Detection

    1. Norman Danner, Danny Krizanc, Marc Liberatore
      Pages 273-284
  9. Auctions

    1. Christopher Thorpe, David C. Parkes
      Pages 285-304
    2. David C. Parkes, Michael O. Rabin, Christopher Thorpe
      Pages 305-324

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Financial Cryptography and Data Security, FC 2009, held in Accra Beach, Barbados, in February 2009.

The 20 revised full papers and 1 revised short papers presented together with 1 panel report and 1 keynote address were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on economics of information security, anonymity and privacy, private computation, authentication and identification, fraud detection and auctions.

Keywords

authentication authenticity chip card credential systems credit card cryptography data leaks data security digital signatures e-commerce electro electronic crime identity management information security privacy

Editors and affiliations

  • Roger Dingledine
    • 1
  • Philippe Golle
    • 2
  1. 1.The Tor ProjectDedhamUSA
  2. 2.Palo Alto Research CenterPalo AltoUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-03549-4
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-03548-7
  • Online ISBN 978-3-642-03549-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book