Financial Cryptography and Data Security
Editat de Ahmad-Reza Sadeghien Limba Engleză Paperback – 7 aug 2013
Preț: 328.49 lei
Preț vechi: 410.62 lei
-20%
Puncte Express: 493
Preț estimativ în valută:
58.09€ • 66.61$ • 50.20£
58.09€ • 66.61$ • 50.20£
Carte tipărită la comandă
Livrare economică 27 aprilie-11 mai
Specificații
ISBN-13: 9783642398834
ISBN-10: 3642398839
Pagini: 424
Ilustrații: XVI, 406 p. 70 illus.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.64 kg
Ediția:2013
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642398839
Pagini: 424
Ilustrații: XVI, 406 p. 70 illus.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.64 kg
Ediția:2013
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Keynote.- Can Nature Help Us Solve Risk Management Issues? Position Paper.- Electronic Payment (Bitcoin).- Quantitative Analysis of the Full Bitcoin Transaction Graph.- Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk (Short Paper).- Evaluating User Privacy in Bitcoin.- Usability Aspects.- The Importance of Being Earnest [In Security Warnings] (Short Paper).- Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing (Short Paper).- RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication (Short Paper).- Secure Computation.- Practical Fully Simulatable Oblivious Transfer with Sublinear Communication.- Unconditionally-Secure Robust Secret Sharing with Minimum Share Size.- A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data.- Passwords.- “Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks.- Hey, You, Get Off of My Clipboard: On How Usability Trumps Security in Android Password Managers.- Privacy Primitives and Non-repudiation.- Unique Ring Signatures: A Practical Construction (Short Paper).- Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency.- Accumulators and U-Prove Revocation (Short Paper).- Anonymity.- Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy (Short Paper).- P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems (Short Paper).- Hardware Security.- Coupon Collector’s Problem for Fault Analysis against AES – High Tolerance for Noisy Fault Injections (Short Paper).- Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study (Short Paper).- On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards (Short Paper).- Secure Computation and Secret Sharing.- Securely Solving Simple Combinatorial Graph Problems.- Parallel and Dynamic Searchable SymmetricEncryption.- GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.- Invited Talk.- The Untapped Potential of Trusted Execution Environments on Mobile Devices: Extended Abstract.- Authentication Attacks and Countermeasures.- Stark: Tamperproof Authentication to Resist Keylogging.- Risks of Offline Verify PIN on Contactless Cards (Short Paper).- How to Attack Two-Factor Authentication Internet Banking (Short Paper).- CAge: Taming Certificate Authorities by Inferring Restricted Scopes (Short Paper).- Privacy of Data and Communication.- Interdependent Privacy: Let Me Share Your Data.- A Secure Submission System for Online Whistle blowing Platforms (Short Paper).- Securing Anonymous Communication Channels under the Selective DoS Attack (Short Paper).- Private Data Retrieval.- PIRMAP: Efficient Private Information Retrieval for MapReduce.- Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates (Short Paper).- Posters.- Three-Factor User Authentication Method Using Biometrics Challenge Response.- Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services.- Onions for Sale: Putting Privacy on the Market.- Searchable Encryption Supporting General Boolean Expression Queries.- A Privacy Preserving E-Payment Architecture.- Communication Services Empowered with a Classical Chaos Based Cryptosystem.
Recenzii
From the book reviews:
“Edited by Ahmad-Reza Sadeghi from the Center for Advanced Security Research Darmstadt (CASED) in Germany, the volume contains selected papers that are categorized into 12 sections besides the keynote and nominated posters. … this volume offers something for everyone, including those in academia and industry and in various information security domains.” (Phoram Mehta, Computing Reviews, July, 2014)
“Edited by Ahmad-Reza Sadeghi from the Center for Advanced Security Research Darmstadt (CASED) in Germany, the volume contains selected papers that are categorized into 12 sections besides the keynote and nominated posters. … this volume offers something for everyone, including those in academia and industry and in various information security domains.” (Phoram Mehta, Computing Reviews, July, 2014)
Caracteristici
Fast conference proceedings State-of-the-art report Up to date results