E-Book, Englisch, 332 Seiten, eBook
Reihe: Security and Cryptology
Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings
E-Book, Englisch, 332 Seiten, eBook
Reihe: Security and Cryptology
ISBN: 978-3-540-31796-8
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Invited Talk.- Privacy Enhanced Technologies: Methods – Markets – Misuse.- Digital Business.- Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains.- Protection Mechanisms Against Phishing Attacks.- Dropout-Tolerant TTP-Free Mental Poker.- A Self-healing Mechanism for an Intrusion Tolerance System.- Protecting Online Rating Systems from Unfair Ratings.- Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP.- Designing Secure E-Tendering Systems.- Mobile/Wireless Services.- A Multilateral Secure Payment System for Wireless LAN Hotspots.- Secure Group Communications over Combined Wired and Wireless Networks.- A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms.- Making Money with Mobile Qualified Electronic Signatures.- Certificate Revocation/Index Search.- Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT).- Secure Index Search for Groups.- Trust.- Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations.- Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security.- The Fuzzy and Dynamic Nature of Trust.- Towards an Ontology of Trust.- Digital Signature.- An Improved Group Signature Scheme.- Efficient Member Revocation in Group Signature Schemes.- Conditional Digital Signatures.- A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions.- Privacy.- Privacy Enforcement for IT Governance in Enterprises: Doing It for Real.- An Adaptive Privacy Management System for Data Repositories.- Privacy Preserving Data Mining Services on the Web.- Reading Your Keystroke: Whose Mail Is It?.- E-Auctions.- A Novel Construction of Two-Party PrivateBidding Protocols from Yao’s Millionaires Problem.- An Improved Double Auction Protocol Against False Bids.- An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions.- Smart Cards/Authentication.- A Secure Fingerprint Authentication System on an Untrusted Computing Environment.- Security Enhancement for Password Authentication Schemes with Smart Cards.- Securing Operating System Services Based on Smart Cards.