Financial Cryptography and Data Security
Editat de Sven Dietrich, Rachna Dhamijaen Limba Engleză Paperback – 18 dec 2007
Preț: 326.48 lei
Preț vechi: 408.10 lei
-20% Nou
Puncte Express: 490
Preț estimativ în valută:
57.77€ • 67.37$ • 50.73£
57.77€ • 67.37$ • 50.73£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540773658
ISBN-10: 3540773657
Pagini: 404
Ilustrații: XIV, 394 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.61 kg
Ediția:2007
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540773657
Pagini: 404
Ilustrații: XIV, 394 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.61 kg
Ediția:2007
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Keynote Address.- Leaving Room for the Bad Guys.- Payment Systems.- Vulnerabilities in First-Generation RFID-enabled Credit Cards.- Conditional E-Cash.- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.- Panel.- Panel: RFID Security and Privacy.- Position Statement in RFID S&P Panel: RFID and the Middleman.- Position Statement in RFID S&P Panel: Contactless Smart Cards.- Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure.- Anonymity.- A Model of Onion Routing with Provable Anonymity.- K-Anonymous Multi-party Secret Handshakes.- Authentication.- Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups.- On Authentication with HMAC and Non-random Properties.- Anonymity and Privacy.- Hidden Identity-Based Signatures.- Space-Efficient Private Search with Applications to Rateless Codes.- Cryptography and Commercial Transactions.- Cryptographic Securities Exchanges.- Improved Multi-party Contract Signing.- Informant: Detecting Sybils Using Incentives.- Financial Transactions and Web Services.- Dynamic Virtual Credit Card Numbers.- The Unbearable Lightness of PIN Cracking.- Panel.- Virtual Economies: Threats and Risks.- Invited Talk.- Usable SPACE: Security, Privacy, and Context for the Mobile User.- System Presentation.- Personal Digital Rights Management for Mobile Cellular Devices.- Cryptography.- Certificate Revocation Using Fine Grained Certificate Space Partitioning.- An Efficient Aggregate Shuffle Argument Scheme.- Usable Security Workshop.- Preface.- Full Papers.- An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.- WSKE: Web Server Key Enabled Cookies.- Usability Analysis ofSecure Pairing Methods.- Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.- Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers.- Short Papers.- What Instills Trust? A Qualitative Study of Phishing.- Phishing IQ Tests Measure Fear, Not Ability.- Mental Models of Security Risks.- Improving Usability by Adding Security to Video Conferencing Systems.- A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?.