Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
The8thAnnualFinancialCryptographyConferencewasheldduring9–12Feb- ary 2004 in Key West, Florida, USA. The conference was organized by the - ternational Financial Cryptography Association (IFCA). The program committee, which comprised 25 members, reviewed 78 subm- sions, of which only 17 were accepted for presentation at the conference. This year’s conference di?ered somewhat from those of previous years in its c- sideration of papers devoted to implementation, rather than purely conceptual research; one of these submissions was presented at the conference. This rep- sented a movement in the conference toward practical problems and real-world perspectives as a complement to more traditional academic forms of research. In this spirit, the program included a number of excellent invited speakers. In the opening talk of the conference, Jack Selby threw down the gauntlet, - scribing some of the achievements of the PayPal system, but also enumerating reasons for the failures of many elegant e-cash schemes in the past. Ron Rivest, in contrast, described an emerging success in the cleverly conceived Peppercoin micropayment system. Jacques Stern enlightened us with his experience in the cryptographic design of banking cards in France. Simon Pugh unveiled some - tailsofanewgenerationofwirelesscreditcard. Finally,indeferenceto themany consumers in the world lacking either techno-savvy or technological resources that we often too easily take for granted, Jon Peha described a ?elded banking system that avoids reliance on conventional ?nancial infrastructures. Thanks to all of these speakers for rounding out the conference with their expertise and breadth of vision.
Content Level »Research
Keywords »DES - E-Payment - Session - anonymity - authentication - communication - cryptography - cryptology - digital payment systems - digital signatures - electronic cash - electronic voting - identity - secure systems - security
Invited Talks.- Analyzing the Success and Failure of Recent e-Payment Schemes.- Peppercoin Micropayments.- Loyalty and Micropayment Systems.- Microcredits for Verifiable Foreign Service Provider Metering.- A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves.- User Authentication.- Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop.- Call Center Customer Verification by Query-Directed Passwords.- Invited Talks.- Cryptography and the French Banking Cards: Past, Present, Future.- PayPass Security and Risk.- e-Voting.- The Vector-Ballot e-Voting Approach.- Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast.- Panel Session: Building Usable Security Systems.- Usability and Acceptability of Biometric Security Systems.- Mental Models of Computer Security.- Visualization Tools for Security Administrators.- Secure Interaction Design.- Invited Talk.- Bringing Payment Technology to the Unbanked.- Auctions and Lotteries.- Interleaving Cryptography and Mechanism Design.- Secure Generalized Vickrey Auction without Third-party Servers.- Electronic National Lotteries.- Identity-Based Chameleon Hash and Applications.- Game Theoretic and Cryptographic Tools.- Selecting Correlated Random Actions.- An Efficient and Usable Multi-show Non-transferable Anonymous Credential System.- The Ephemeral Pairing Problem.- Mix Networks and Anonymous Communications.- Mixminion: Strong Anonymity for Financial Cryptography.- Practical Anonymity for the Masses with MorphMix.- Timing Attacks in Low-Latency Mix Systems.- Provable Unlinkability against Traffic Analysis.