Financial Cryptography and Data Security
Springer Berlin (Verlag)
978-3-540-77365-8 (ISBN)
Sven Dietrich, geboren 1969 in Reichenbach im Vogtland, ist gelernter Rechtsanwalt und hatte von 2001 bis 2008 das Amt des Bürgermeisters für Umwelt und Ordnung der Stadt Zwickau inne.
Keynote Address.- Leaving Room for the Bad Guys.- Payment Systems.- Vulnerabilities in First-Generation RFID-enabled Credit Cards.- Conditional E-Cash.- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.- Panel.- Panel: RFID Security and Privacy.- Position Statement in RFID S&P Panel: RFID and the Middleman.- Position Statement in RFID S&P Panel: Contactless Smart Cards.- Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure.- Anonymity.- A Model of Onion Routing with Provable Anonymity.- K-Anonymous Multi-party Secret Handshakes.- Authentication.- Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups.- On Authentication with HMAC and Non-random Properties.- Anonymity and Privacy.- Hidden Identity-Based Signatures.- Space-Efficient Private Search with Applications to Rateless Codes.- Cryptography and Commercial Transactions.- Cryptographic Securities Exchanges.- Improved Multi-party Contract Signing.- Informant: Detecting Sybils Using Incentives.- Financial Transactions and Web Services.- Dynamic Virtual Credit Card Numbers.- The Unbearable Lightness of PIN Cracking.- Panel.- Virtual Economies: Threats and Risks.- Invited Talk.- Usable SPACE: Security, Privacy, and Context for the Mobile User.- System Presentation.- Personal Digital Rights Management for Mobile Cellular Devices.- Cryptography.- Certificate Revocation Using Fine Grained Certificate Space Partitioning.- An Efficient Aggregate Shuffle Argument Scheme.- Usable Security Workshop.- Preface.- Full Papers.- An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.- WSKE: Web Server Key Enabled Cookies.- Usability Analysis ofSecure Pairing Methods.- Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.- Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers.- Short Papers.- What Instills Trust? A Qualitative Study of Phishing.- Phishing IQ Tests Measure Fear, Not Ability.- Mental Models of Security Risks.- Improving Usability by Adding Security to Video Conferencing Systems.- A Sense of Security in Pervasive Computing-Is the Light on When the Refrigerator Door Is Closed?.
Erscheint lt. Verlag | 18.12.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 394 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 609 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • anonymity • authenticity • credential systems • credit cards • cryptographic protocols • cryptography • Cryptology • Data Security • DES • Digital Payment Systems • Digital Signatures • E-Commerce • electronic auctions • Electronic Cash • electronic voting • e-passport • financial cryptography • Financial Transactions • fraud detection • Hardcover, Softcover / Informatik, EDV/Informatik • HCI • HC/Informatik, EDV/Informatik • key distribution • onion routing • Phishing • privacy • Radio-Frequency Identification (RFID) • Reliability • RFID • RFID (Radio Frequency Identificatio) • secret handshake • Secure Systems • security • Smart card • User Interface Design • Vulnerabilities • Wi-Fi Protected Setup |
ISBN-10 | 3-540-77365-7 / 3540773657 |
ISBN-13 | 978-3-540-77365-8 / 9783540773658 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich