Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers / Edition 1
by Giovanni Di Crescenzo
This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data Security, FC 2006, held in Anguilla, British West Indies in February/March 2006. The 19 revised full papers and six revised short papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in
… See more details belowOverview
This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data Security, FC 2006, held in Anguilla, British West Indies in February/March 2006. The 19 revised full papers and six revised short papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections.
Product Details
- ISBN-13:
- 9783540462552
- Publisher:
- Springer Berlin Heidelberg
- Publication date:
- 11/13/2006
- Series:
- Lecture Notes in Computer Science / Security and Cryptology Series, #4107
- Edition description:
- 2006
- Pages:
- 327
- Product dimensions:
- 0.72(w) x 6.14(h) x 9.21(d)
Table of Contents
Authentication and Fraud Detection.- Phoolproof Phishing Prevention.- A Prool for Secure Public Instant Messaging.- Using Automated Banking Certificates to Detect Unauthorised Financial Transactions.- Privacy.- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption.- A Private Stable Matching Algorithm.- Private Policy Negotiation.- Reputation and Mix-Nets.- Uncheatable Reputation for Distributed Computation Markets.- An Efficient Publicly Verifiable Mix-Net for Long Inputs.- Auditable Privacy: On Tamper-Evident Mix Networks.- Short Papers.- A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation.- Defeating Malicious Servers in a Blind Signatures Based Voting System.- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng.- Credit Transfer for Market-Based Infrastructure.- A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions.- Cryptanalysis of a Partially Blind Signature Scheme orHowtoMake$100Billswith$1and$2Ones.- Conditional Financial Cryptography.- A Generic Construction for Token-Controlled Public Key Encryption.- Timed-Release and Key-Insulated Public Key Encryption.- Conditional Encrypted Mapping and Comparing Encrypted Numbers.- Revisiting Oblivious Signature-Based Envelopes.- Payment Systems.- Provably Secure Electronic Cash Based on Blind Multisignature Schemes.- Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.- Privacy-Protecting Coupon System Revisited.- Efficient Prools.- Efficient Broadcast Encryption Scheme with Log-Key Storage.- Efficient Correlated Action Selection.- Efficient Cryptographic Prools Realizing E-Markets with Price Discrimination.
Customer Reviews
Average Review: