Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St. Lucia, in February/March 2011. The 16 revised full papers and 10 revised short papers presented were carefully reviewed and selected from 65 initial submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on fundamental and applied real-world deployments on all aspects surrounding commerce security; as well as on systems security and inter-disciplinary efforts.

Author(s): Rainer Böhme, Stefanie Pötzsch (auth.), George Danezis (eds.)
Series: Lecture Notes in Computer Science 7035
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2012

Language: English
Pages: 334
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Algorithm Analysis and Problem Complexity

Front Matter....Pages -
Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data....Pages 1-15
It’s All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice....Pages 16-30
Evaluating the Privacy Risk of Location-Based Services....Pages 31-46
Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance....Pages 47-61
Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection....Pages 62-76
Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools....Pages 77-84
A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper)....Pages 85-92
Impeding Individual User Profiling in Shopper Loyalty Programs....Pages 93-101
Beyond Risk-Based Access Control: Towards Incentive-Based Access Control....Pages 102-112
Authenticated Key Exchange under Bad Randomness....Pages 113-126
Oblivious Outsourced Storage with Delegation....Pages 127-140
Homomorphic Signatures for Digital Photographs....Pages 141-157
Revisiting the Computational Practicality of Private Information Retrieval....Pages 158-172
Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper)....Pages 173-181
A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time....Pages 182-189
An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs....Pages 190-204
Peeling Away Layers of an RFID Security System....Pages 205-219
Might Financial Cryptography Kill Financial Innovation? – The Curious Case of EMV....Pages 220-234
hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers....Pages 235-249
Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper)....Pages 250-259
Proximax: Measurement-Driven Proxy Dissemination (Short Paper)....Pages 260-267
BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper)....Pages 268-275
Towards Secure Bioinformatics Services (Short Paper)....Pages 276-283
Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications....Pages 284-298
Re-evaluating the Wisdom of Crowds in Assessing Web Security....Pages 299-314
Mercury: Recovering Forgotten Passwords Using Personal Devices....Pages 315-330
Back Matter....Pages -