The Resource Financial cryptography and data security : 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised selected papers, Angelos D. Keromytis (ed.), (electronic resource)

Financial cryptography and data security : 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised selected papers, Angelos D. Keromytis (ed.), (electronic resource)

Label
Financial cryptography and data security : 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised selected papers
Title
Financial cryptography and data security
Title remainder
16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised selected papers
Statement of responsibility
Angelos D. Keromytis (ed.)
Title variation
FC 2012
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27-March 1, 2012. The 29 revised full papers presented were carefully selected and reviewed from 88 submissions. The papers cover all aspects of securing transactions and systems, including information assurance in the context of finance and commerce
Member of
Cataloging source
GW5XE
Index
index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
7397
Label
Financial cryptography and data security : 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised selected papers, Angelos D. Keromytis (ed.), (electronic resource)
Link
http://dx.doi.org/10.1007/978-3-642-32946-3
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and author index
Color
multicolored
Contents
  • Tyler Moore, Jie Han and Richard Clayton
  • Deploying Secure Multi-Party Computation for Financial Data Analysis
  • (Short Paper)
  • Dan Bogdanov, Riivo Talviste and Jan Willemson
  • Cryptographic Rule-Based Trading
  • (Short Paper)
  • Christopher Thorpe and Steven R. Willis
  • Efficient Private Proximity Testing with GSM Location Sketches
  • Zi Lin, Denis Foo Kune and Nicholas Hopper
  • Metrics for Measuring ISP Badness: The Case of Spam
  • Social Authentication: Harder Than It Looks
  • (Short Paper)
  • Benjamin Johnson, John Chuang, Jens Grossklags and Nicolas Christin
  • Congestion-Aware Path Selection for Tor
  • Tao Wang, Kevin Bauer, Clara Forero and Ian Goldberg
  • Attacking the Washington, D.C. Internet Voting System
  • Scott Wolchok, Eric Wustrow, Dawn Isabel and J. Alex Halderman --
  • Hyoungshick Kim, John Tang and Ross Anderson
  • The MVP Web-Based Authentication Framework
  • (Short Paper)
  • Sonia Chiasson, Chris Deschamps, Elizabeth Stobert, Max Hlywa and Bruna Freitas Machado, et al.
  • A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs
  • Joseph Bonneau, Sören Preibusch and Ross Anderson
  • The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs
  • Privacy-Preserving Stream Aggregation with Fault Tolerance
  • T. -H. Hubert Chan, Elaine Shi and Dawn Song
  • Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access
  • (Short Paper)
  • Daniel Slamanig
  • Privacy Enhanced Access Control for Outsourced Data Sharing
  • Mariana Raykova, Hang Zhao and Steven M. Bellovin
  • Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers
  • Andres Molina-Markham, George Danezis, Kevin Fu, Prashant Shenoy and David Irwin
  • Memory-Efficient Garbled Circuit Generation for Mobile Devices
  • Security Audits Revisited
  • Benjamin Mood, Lara Letaw and Kevin Butler
  • Oblivious Decision Programs from Oblivious Transfer: Efficient Reductions
  • Payman Mohassel and Salman Niksefat
  • UC-Secure Searchable Symmetric Encryption
  • Kaoru Kurosawa and Yasuhiro Ohtaki --
  • Rainer Böhme
  • Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging
  • Attila A. Yavuz, Peng Ning and Michael K. Reiter
  • On Secure Two-Party Integer Division
  • Morten Dahl, Chao Ning and Tomas Toft
  • A Non-interactive Range Proof with Constant Communication
  • Rafik Chaabouni, Helger Lipmaa and Bingsheng Zhang
  • Oblivious Printing of Secret Messages in a Multi-party Setting
  • Aleksander Essex and Urs Hengartner
  • Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs
  • Anthony Van Herrewege, Stefan Katzenbeisser, Roel Maes, Roel Peeters and Ahmad-Reza Sadeghi, et al.
  • CommitCoin: Carbon Dating Commitments with Bitcoin
  • (Short Paper)
  • Jeremy Clark and Aleksander Essex
  • Bitter to Better -- How to Make Bitcoin a Better Currency
  • Simon Barber, Xavier Boyen, Elaine Shi and Ersin Uzun
  • CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm
  • Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi and Thomas Schneider
  • A Cache Timing Attack on AES in Virtualization Environments
  • Michael Weiß, Benedikt Heinz and Frederic Stumpf
  • Softer Smartcards: Usable Cryptographic Tokens witsfh Secure Execution
  • Franz Ferdinand Brasser, Sven Bugiel, Atanas Filyanov, Ahmad-Reza Sadeghi and Steffen Schulz
  • The PACE AA Protocol for Machine Readable Travel Documents, and Its Security
  • Jens Bender, Özgür Dagdelen, Marc Fischlin and Dennis Kügler
Control code
ocn808371159
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9783642329463
Isbn Type
(electronic bk.)
Level of compression
unknown
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)808371159

Library Locations

    • ERDC - Hanover (US Army Engineer Research and Development Center) Borrow it
      72 Lyme Road, Hanover, NH, 03755-1290, US
      43.7279642 -72.2684934
Processing Feedback ...