E-Book, Englisch, Band 4107, 327 Seiten, eBook
Di Crescenzo / Rubin Financial Cryptography and Data Security
2006
ISBN: 978-3-540-46256-9
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers
E-Book, Englisch, Band 4107, 327 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-46256-9
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Authentication and Fraud Detection.- Phoolproof Phishing Prevention.- A Protocol for Secure Public Instant Messaging.- Using Automated Banking Certificates to Detect Unauthorised Financial Transactions.- Privacy.- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption.- A Private Stable Matching Algorithm.- Private Policy Negotiation.- Reputation and Mix-Nets.- Uncheatable Reputation for Distributed Computation Markets.- An Efficient Publicly Verifiable Mix-Net for Long Inputs.- Auditable Privacy: On Tamper-Evident Mix Networks.- Short Papers.- A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation.- Defeating Malicious Servers in a Blind Signatures Based Voting System.- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng.- Credit Transfer for Market-Based Infrastructure.- A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions.- Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones.- Conditional Financial Cryptography.- A Generic Construction for Token-Controlled Public Key Encryption.- Timed-Release and Key-Insulated Public Key Encryption.- Conditional Encrypted Mapping and Comparing Encrypted Numbers.- Revisiting Oblivious Signature-Based Envelopes.- Payment Systems.- Provably Secure Electronic Cash Based on Blind Multisignature Schemes.- Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.- Privacy-Protecting Coupon System Revisited.- Efficient Protocols.- Efficient Broadcast Encryption Scheme with Log-Key Storage.- Efficient Correlated Action Selection.- Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.