Financial Cryptography and Data Security
Springer Berlin (Verlag)
978-3-540-26656-3 (ISBN)
Dr. Moti Yung is Senior Researcher at Columbia University and an editor of the International Association for Cryptologic Research's Journal of Cryptology.
Threat and Attacks.- Fraud Within Asymmetric Multi-hop Cellular Networks.- Protecting Secret Data from Insider Attacks.- Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling.- Invited Speaker.- Trust and Swindling on the Internet.- Digital Signing Methods.- Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures).- Time Capsule Signature.- Policy-Based Cryptography and Applications.- Panel.- A Chat at the Old Phishin' Hole.- Modeling and Preventing Phishing Attacks.- Helping the Phish Detect the Lure.- Who'd Phish from the Summit of Kilimanjaro?.- Privacy.- A Privacy-Protecting Coupon System.- Testing Disjointness of Private Datasets.- Hardware Oriented Mechanisms.- RFID Traceability: A Multilayer Problem.- Information-Theoretic Security Analysis of Physical Uncloneable Functions.- Supporting Financial Transactions.- Risk Assurance for Hedge Funds Using Zero Knowledge Proofs.- Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure.- Systems, Applications, and Experiences.- Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce.- Securing Sensitive Data with the Ingrian DataSecure Platform.- Ciphire Mail Email Encryption and Authentication.- Message Authentication.- A User-Friendly Approach to Human Authentication of Messages.- Approximate Message Authentication and Biometric Entity Authentication.- Exchanges and Contracts.- Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model.- Achieving Fairness in Private Contract Negotiation.- Auctions and Voting.- Small Coalitions Cannot Manipulate Voting.- Efficient Privacy-Preserving Protocols for Multi-unit Auctions.- Event Driven Private Counters.- Works inProgress.- Secure Distributed Human Computation.- Secure Multi-attribute Procurement Auction.- Audit File Reduction Using N-Gram Models.- User Authentication.- Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication.- Secure Biometric Authentication for Weak Computational Devices.- Panel Summary: Incentives, Markets and Information Security.
Erscheint lt. Verlag | 8.7.2005 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 376 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 152 x 229 mm |
Gewicht | 553 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • authentication • Cryptology • Digital Payment Systems • Digital Signatures • E-Commerce • electronic auctions • Electronic Cash • electronic voting • Escrow • financial cryptography • Financial Transactions • Information • Information Security • Internet • micropayment • Secure Systems • security • Trust • Zero Knowledge |
ISBN-10 | 3-540-26656-9 / 3540266569 |
ISBN-13 | 978-3-540-26656-3 / 9783540266563 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich