Buch, Englisch, 406 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 639 g
Reihe: Security and Cryptology
17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers
Buch, Englisch, 406 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 639 g
Reihe: Security and Cryptology
ISBN: 978-3-642-39883-4
Verlag: Springer
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Mathematik | Informatik Mathematik Mathematik Interdisziplinär Finanz- und Versicherungsmathematik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Wirtschaftswissenschaften Finanzsektor & Finanzdienstleistungen Bankwirtschaft
Weitere Infos & Material
Keynote.- Can Nature Help Us Solve Risk Management Issues? Position Paper.- Electronic Payment (Bitcoin).- Quantitative Analysis of the Full Bitcoin Transaction Graph.- Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk (Short Paper).- Evaluating User Privacy in Bitcoin.- Usability Aspects.- The Importance of Being Earnest [In Security Warnings] (Short Paper).- Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing (Short Paper).- RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication (Short Paper).- Secure Computation.- Practical Fully Simulatable Oblivious Transfer with Sublinear Communication.- Unconditionally-Secure Robust Secret Sharing with Minimum Share Size.- A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data.- Passwords.- “Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks.- Hey, You, Get Off of My Clipboard: On How Usability Trumps Security in Android Password Managers.- Privacy Primitives and Non-repudiation.- Unique Ring Signatures: A Practical Construction (Short Paper).- Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency.- Accumulators and U-Prove Revocation (Short Paper).- Anonymity.- Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy (Short Paper).- P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems (Short Paper).- Hardware Security.- Coupon Collector’s Problem for Fault Analysis against AES – High Tolerance for Noisy Fault Injections (Short Paper).- Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study (Short Paper).- On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards (Short Paper).- Secure Computation and Secret Sharing.- Securely Solving Simple Combinatorial Graph Problems.- Parallel and Dynamic Searchable SymmetricEncryption.- GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.- Invited Talk.- The Untapped Potential of Trusted Execution Environments on Mobile Devices: Extended Abstract.- Authentication Attacks and Countermeasures.- Stark: Tamperproof Authentication to Resist Keylogging.- Risks of Offline Verify PIN on Contactless Cards (Short Paper).- How to Attack Two-Factor Authentication Internet Banking (Short Paper).- CAge: Taming Certificate Authorities by Inferring Restricted Scopes (Short Paper).- Privacy of Data and Communication.- Interdependent Privacy: Let Me Share Your Data.- A Secure Submission System for Online Whistle blowing Platforms (Short Paper).- Securing Anonymous Communication Channels under the Selective DoS Attack (Short Paper).- Private Data Retrieval.- PIRMAP: Efficient Private Information Retrieval for MapReduce.- Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates (Short Paper).- Posters.- Three-Factor User Authentication Method Using Biometrics Challenge Response.- Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services.- Onions for Sale: Putting Privacy on the Market.- Searchable Encryption Supporting General Boolean Expression Queries.- A Privacy Preserving E-Payment Architecture.- Communication Services Empowered with a Classical Chaos Based Cryptosystem.