Financial Cryptography and Data Security
Springer Berlin (Verlag)
978-3-642-03548-7 (ISBN)
Economics of Information Security I.- Mitigating Inadvertent Insider Threats with Incentives.- Deterring Online Advertising Fraud through Optimal Payment in Arrears.- Anonymity and Privacy I.- Privacy-Preserving Information Markets for Computing Statistical Data.- Achieving Privacy in a Federated Identity Management System.- Data Hemorrhages in the Health-Care Sector.- Private Computation.- Solving Linear Programs Using Multiparty Computation.- Private Intersection of Certified Sets.- Privacy-Preserving Classifier Learning.- Economics of Information Security II.- Investments and Trade-offs in the Economics of Information Security.- Blue versus Red: Towards a Model of Distributed Security Attacks.- Authentication and Identification.- Optimised to Fail: Card Readers for Online Banking.- Expecting the Unexpected: Towards Robust Credential Infrastructure.- Optical DNA.- Panel.- Passwords: If We're So Smart, Why Are We Still Using Them?.- Fraud Detection.- Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection.- Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing.- Detecting Denial of Service Attacks in Tor.- Auctions.- Cryptographic Combinatorial Securities Exchanges.- Cryptographic Combinatorial Clock-Proxy Auctions.- Secure Multiparty Computation Goes Live.- Anonymity and Privacy II.- Coercion Resistant End-to-end Voting.- Relations Among Privacy Notions.
Erscheint lt. Verlag | 28.7.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 381 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 598 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • authentication • authenticity • chip card • credential systems • credit card • Cryptanalysis • cryptographic protocols • cryptography • Cryptology • data leaks • Data Mining • Data Security • denial of service attack • Digital Signatures • E-Commerce • electro • electronic auctions • electronic crime • electronic voting • Financial Transactions • Hardcover, Softcover / Informatik, EDV/Informatik • HCI • Identity Management • Identity Theft • Information Security • insider attack • Intrusion Detection • key distribution • oblivious transfer • pairings • password authentication • Phishing • Policy • privacy • protection • Reliability • Reverse Engineering • secure payment systems • Smart card • vulnerability • web security |
ISBN-10 | 3-642-03548-5 / 3642035485 |
ISBN-13 | 978-3-642-03548-7 / 9783642035487 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich