Financial Cryptography [electronic resource] : 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers / edited by Ari Juels.

Contributor(s): Juels, Ari [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Lecture Notes in Computer Science ; 3110Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2004Description: XI, 286 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540278092Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Computer software | Information Systems | Computer Science | Data Encryption | Operating Systems | Management of Computing and Information Systems | Computers and Society | Computer Communication Networks | Algorithm Analysis and Problem ComplexityAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
Invited Talks -- Analyzing the Success and Failure of Recent e-Payment Schemes -- Peppercoin Micropayments -- Loyalty and Micropayment Systems -- Microcredits for Verifiable Foreign Service Provider Metering -- A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves -- User Authentication -- Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop -- Call Center Customer Verification by Query-Directed Passwords -- Invited Talks -- Cryptography and the French Banking Cards: Past, Present, Future -- PayPass Security and Risk -- e-Voting -- The Vector-Ballot e-Voting Approach -- Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast -- Panel Session: Building Usable Security Systems -- Usability and Acceptability of Biometric Security Systems -- Mental Models of Computer Security -- Visualization Tools for Security Administrators -- Secure Interaction Design -- Invited Talk -- Bringing Payment Technology to the Unbanked -- Auctions and Lotteries -- Interleaving Cryptography and Mechanism Design -- Secure Generalized Vickrey Auction without Third-party Servers -- Electronic National Lotteries -- Identity-Based Chameleon Hash and Applications -- Game Theoretic and Cryptographic Tools -- Selecting Correlated Random Actions -- An Efficient and Usable Multi-show Non-transferable Anonymous Credential System -- The Ephemeral Pairing Problem -- Mix Networks and Anonymous Communications -- Mixminion: Strong Anonymity for Financial Cryptography -- Practical Anonymity for the Masses with MorphMix -- Timing Attacks in Low-Latency Mix Systems -- Provable Unlinkability against Traffic Analysis.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library
IMSc Library
Link to resource Available EBK3263

Invited Talks -- Analyzing the Success and Failure of Recent e-Payment Schemes -- Peppercoin Micropayments -- Loyalty and Micropayment Systems -- Microcredits for Verifiable Foreign Service Provider Metering -- A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves -- User Authentication -- Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop -- Call Center Customer Verification by Query-Directed Passwords -- Invited Talks -- Cryptography and the French Banking Cards: Past, Present, Future -- PayPass Security and Risk -- e-Voting -- The Vector-Ballot e-Voting Approach -- Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast -- Panel Session: Building Usable Security Systems -- Usability and Acceptability of Biometric Security Systems -- Mental Models of Computer Security -- Visualization Tools for Security Administrators -- Secure Interaction Design -- Invited Talk -- Bringing Payment Technology to the Unbanked -- Auctions and Lotteries -- Interleaving Cryptography and Mechanism Design -- Secure Generalized Vickrey Auction without Third-party Servers -- Electronic National Lotteries -- Identity-Based Chameleon Hash and Applications -- Game Theoretic and Cryptographic Tools -- Selecting Correlated Random Actions -- An Efficient and Usable Multi-show Non-transferable Anonymous Credential System -- The Ephemeral Pairing Problem -- Mix Networks and Anonymous Communications -- Mixminion: Strong Anonymity for Financial Cryptography -- Practical Anonymity for the Masses with MorphMix -- Timing Attacks in Low-Latency Mix Systems -- Provable Unlinkability against Traffic Analysis.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha