Buch, Englisch, Band 3110, 286 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 458 g
8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers
Buch, Englisch, Band 3110, 286 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 458 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-22420-4
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Wirtschaftswissenschaften Finanzsektor & Finanzdienstleistungen Bankwirtschaft
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Mathematik | Informatik EDV | Informatik Betriebssysteme Windows Betriebssysteme
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
Weitere Infos & Material
Invited Talks.- Analyzing the Success and Failure of Recent e-Payment Schemes.- Peppercoin Micropayments.- Loyalty and Micropayment Systems.- Microcredits for Verifiable Foreign Service Provider Metering.- A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves.- User Authentication.- Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop.- Call Center Customer Verification by Query-Directed Passwords.- Invited Talks.- Cryptography and the French Banking Cards: Past, Present, Future.- PayPass Security and Risk.- e-Voting.- The Vector-Ballot e-Voting Approach.- Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast.- Panel Session: Building Usable Security Systems.- Usability and Acceptability of Biometric Security Systems.- Mental Models of Computer Security.- Visualization Tools for Security Administrators.- Secure Interaction Design.- Invited Talk.- Bringing Payment Technology to the Unbanked.- Auctions and Lotteries.- Interleaving Cryptography and Mechanism Design.- Secure Generalized Vickrey Auction without Third-party Servers.- Electronic National Lotteries.- Identity-Based Chameleon Hash and Applications.- Game Theoretic and Cryptographic Tools.- Selecting Correlated Random Actions.- An Efficient and Usable Multi-show Non-transferable Anonymous Credential System.- The Ephemeral Pairing Problem.- Mix Networks and Anonymous Communications.- Mixminion: Strong Anonymity for Financial Cryptography.- Practical Anonymity for the Masses with MorphMix.- Timing Attacks in Low-Latency Mix Systems.- Provable Unlinkability against Traffic Analysis.