This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Financial Cryptography and Data Security, FC 2009, held in Accra Beach, Barbados, in February 2009.
The 20 revised full papers and 1 revised short papers presented together with 1 panel report and 1 keynote address were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on economics of information security, anonymity and privacy, private computation, authentication and identification, fraud detection and auctions.
Author(s): Debin Liu, XiaoFeng Wang, L. Jean Camp (auth.), Roger Dingledine, Philippe Golle (eds.)
Series: Lecture Notes in Computer Science 5628 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009
Language: English
Pages: 381
Tags: Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Computers and Society; Computer Communication Networks; Algorithm Analysis and Problem Complexity
Front Matter....Pages -
Mitigating Inadvertent Insider Threats with Incentives....Pages 1-16
Deterring Online Advertising Fraud through Optimal Payment in Arrears....Pages 17-31
Privacy-Preserving Information Markets for Computing Statistical Data....Pages 32-50
Achieving Privacy in a Federated Identity Management System....Pages 51-70
Data Hemorrhages in the Health-Care Sector....Pages 71-89
Solving Linear Programs Using Multiparty Computation....Pages 90-107
Private Intersection of Certified Sets....Pages 108-127
Privacy-Preserving Classifier Learning....Pages 128-147
Investments and Trade-offs in the Economics of Information Security....Pages 148-166
Blue versus Red: Towards a Model of Distributed Security Attacks....Pages 167-183
Optimised to Fail: Card Readers for Online Banking....Pages 184-200
Expecting the Unexpected: Towards Robust Credential Infrastructure....Pages 201-221
Optical DNA....Pages 222-229
Passwords: If We’re So Smart, Why Are We Still Using Them?....Pages 230-237
Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection....Pages 238-255
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing....Pages 256-272
Detecting Denial of Service Attacks in Tor....Pages 273-284
Cryptographic Combinatorial Securities Exchanges....Pages 285-304
Cryptographic Combinatorial Clock-Proxy Auctions....Pages 305-324
Secure Multiparty Computation Goes Live....Pages 325-343
Coercion Resistant End-to-end Voting....Pages 344-361
Relations Among Privacy Notions....Pages 362-380
Back Matter....Pages -