My Account Log in

1 option

Financial Cryptography and Data Security : 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers / edited by Roger Dingledine, Philippe Golle.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Dingledine, Roger, 1977- editor.
Golle, Philippe, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 5628.
Security and Cryptology ; 5628
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer security.
Management information systems.
Computer science.
Computers and civilization.
Computer networks.
Algorithms.
Cryptology.
Systems and Data Security.
Management of Computing and Information Systems.
Computers and Society.
Computer Communication Networks.
Algorithm Analysis and Problem Complexity.
Local Subjects:
Cryptology.
Systems and Data Security.
Management of Computing and Information Systems.
Computers and Society.
Computer Communication Networks.
Algorithm Analysis and Problem Complexity.
Physical Description:
1 online resource (X, 381 pages).
Edition:
First edition 2009.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
System Details:
text file PDF
Summary:
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Financial Cryptography and Data Security, FC 2009, held in Accra Beach, Barbados, in February 2009. The 20 revised full papers and 1 revised short papers presented together with 1 panel report and 1 keynote address were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on economics of information security, anonymity and privacy, private computation, authentication and identification, fraud detection and auctions.
Contents:
Economics of Information Security I
Mitigating Inadvertent Insider Threats with Incentives
Deterring Online Advertising Fraud through Optimal Payment in Arrears
Anonymity and Privacy I
Privacy-Preserving Information Markets for Computing Statistical Data
Achieving Privacy in a Federated Identity Management System
Data Hemorrhages in the Health-Care Sector
Private Computation
Solving Linear Programs Using Multiparty Computation
Private Intersection of Certified Sets
Privacy-Preserving Classifier Learning
Economics of Information Security II
Investments and Trade-offs in the Economics of Information Security
Blue versus Red: Towards a Model of Distributed Security Attacks
Authentication and Identification
Optimised to Fail: Card Readers for Online Banking
Expecting the Unexpected: Towards Robust Credential Infrastructure
Optical DNA
Panel
Passwords: If We're So Smart, Why Are We Still Using Them?
Fraud Detection
Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Detecting Denial of Service Attacks in Tor
Auctions
Cryptographic Combinatorial Securities Exchanges
Cryptographic Combinatorial Clock-Proxy Auctions
Secure Multiparty Computation Goes Live
Anonymity and Privacy II
Coercion Resistant End-to-end Voting
Relations Among Privacy Notions.
Other Format:
Printed edition:
ISBN:
978-3-642-03549-4
9783642035494
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account