Financial Cryptography and Data Security
Editat de Andrew S. Patrick, Moti Yungen Limba Engleză Paperback – 8 iul 2005
Preț: 326.07 lei
Preț vechi: 407.59 lei
-20% Nou
Puncte Express: 489
Preț estimativ în valută:
57.70€ • 67.29$ • 50.66£
57.70€ • 67.29$ • 50.66£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540266563
ISBN-10: 3540266569
Pagini: 396
Ilustrații: XII, 376 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.6 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540266569
Pagini: 396
Ilustrații: XII, 376 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.6 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Threat and Attacks.- Fraud Within Asymmetric Multi-hop Cellular Networks.- Protecting Secret Data from Insider Attacks.- Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling.- Invited Speaker.- Trust and Swindling on the Internet.- Digital Signing Methods.- Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).- Time Capsule Signature.- Policy-Based Cryptography and Applications.- Panel.- A Chat at the Old Phishin’ Hole.- Modeling and Preventing Phishing Attacks.- Helping the Phish Detect the Lure.- Who’d Phish from the Summit of Kilimanjaro?.- Privacy.- A Privacy-Protecting Coupon System.- Testing Disjointness of Private Datasets.- Hardware Oriented Mechanisms.- RFID Traceability: A Multilayer Problem.- Information-Theoretic Security Analysis of Physical Uncloneable Functions.- Supporting Financial Transactions.- Risk Assurance for Hedge Funds Using Zero Knowledge Proofs.- Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure.- Systems, Applications, and Experiences.- Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce.- Securing Sensitive Data with the Ingrian DataSecure Platform.- Ciphire Mail Email Encryption and Authentication.- Message Authentication.- A User-Friendly Approach to Human Authentication of Messages.- Approximate Message Authentication and Biometric Entity Authentication.- Exchanges and Contracts.- Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model.- Achieving Fairness in Private Contract Negotiation.- Auctions and Voting.- Small Coalitions Cannot Manipulate Voting.- Efficient Privacy-Preserving Protocols for Multi-unit Auctions.- Event Driven Private Counters.- Works inProgress.- Secure Distributed Human Computation.- Secure Multi-attribute Procurement Auction.- Audit File Reduction Using N-Gram Models.- User Authentication.- Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication.- Secure Biometric Authentication for Weak Computational Devices.- Panel Summary: Incentives, Markets and Information Security.