Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Financial Cryptography and Data Security, FC 2010, held in Tenerife, Canary Islands, Spain in January 2010. The 19 revised full papers and 15 revised short papers presented together with 1 panel report and 7 poster papers were carefully reviewed and selected from 130 submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security.

Author(s): Ueli Maurer (auth.), Radu Sion (eds.)
Series: Lecture Notes in Computer Science 6052 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 432
Tags: Data Encryption

Front Matter....Pages -
Constructive Cryptography – A Primer....Pages 1-1
Security Mechanisms with Selfish Players in Wireless Networks....Pages 2-2
Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory....Pages 3-3
Multichannel Protocols to Prevent Relay Attacks....Pages 4-19
A Traceability Attack against e-Passports....Pages 20-34
Secure Computation with Fixed-Point Numbers....Pages 35-50
Implementing a High-Assurance Smart-Card OS....Pages 51-65
Unlinkable Priced Oblivious Transfer with Rechargeable Wallets....Pages 66-81
Multiple Denominations in E-cash with Compact Transaction Data....Pages 82-97
What’s in a Name?....Pages 98-113
Cryptographic Protocol Analysis of AN.ON....Pages 114-128
A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys....Pages 129-142
Practical Private Set Intersection Protocols with Linear Complexity....Pages 143-159
Design and Implementation of a Key-Lifecycle Management System....Pages 160-174
Measuring the Perpetrators and Funders of Typosquatting....Pages 175-191
A Learning-Based Approach to Reactive Security....Pages 192-206
Embedded SFE: Offloading Server and Network Using Hardware Tokens....Pages 207-221
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors....Pages 222-237
Building Incentives into Tor....Pages 238-256
Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections....Pages 257-271
Automatically Preparing Safe SQL Queries....Pages 272-288
PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure....Pages 289-303
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy....Pages 304-311
Designing for Audit: A Voting Machine with a Tiny TCB....Pages 312-319
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits....Pages 320-327
Security Applications of Diodes with Unique Current-Voltage Characteristics....Pages 328-335
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication....Pages 336-342
All You Can Eat or Breaking a Real-World Contactless Payment System....Pages 343-350
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model....Pages 351-358
Using Sphinx to Improve Onion Routing Circuit Construction....Pages 359-366
Secure Multiparty AES....Pages 367-374
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis....Pages 375-382
On Robust Key Agreement Based on Public Key Authentication....Pages 383-390
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing....Pages 391-399
Signatures of Reputation....Pages 400-407
Intention-Disguised Algorithmic Trading....Pages 408-415
When Information Improves Information Security....Pages 416-423
BetterThanPin: Empowering Users to Fight Phishing (Poster)....Pages 424-424
Certification Intermediaries and the Alternative (Poster)....Pages 425-425
SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs....Pages 426-426
Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks....Pages 427-427
Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols....Pages 428-428
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers....Pages 429-429
Back Matter....Pages -