Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Financial Cryptography and Data Security - 11th International Conference, FC 2007, and First International

Financial Cryptography and Data Security

11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers

Dietrich, Sven, Dhamija, Rachna (Eds.)

2007, XII, 392 p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$89.99

(net) price for USA

ISBN 978-3-540-77366-5

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$119.00

(net) price for USA

ISBN 978-3-540-77365-8

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

There are few more important areas of current research than this, and here, Springer has published a double helping of the latest work in the field.

That’s because the book contains the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, and the co-located 1st International Workshop on Usable Security, both held in Trinidad/Tobago in February 2007.

The book includes 17 revised full papers, 1 system presentation paper and the transcripts of 5 panel sessions from FC 2007.

The papers, which were carefully reviewed and selected from 85 submissions, are organized in topical sections.

These include many of the most important areas of work currently under way.

Topics you’ll find here cover payment systems and authentication, anonymity and privacy, cryptography and commercial transactions, financial transactions and web services, and cryptography.

The book concludes with 5 revised full and 5 revised short papers from the USEC 2007 workshop. This event brought together an interdisciplinary group of researchers and practitioners. They discussed usability problems and

Content Level » Research

Keywords » DES - Radio-Frequency Identification (RFID) - Wi-Fi Protected Setup - anonymity - credential systems - cryptography - cryptology - data security - e-commerce - e-passport - electronic auctions - electronic cash - electronic voting - financial cryptography - privacy

Related subjects » Communication Networks - General Issues - Security and Cryptology - Software Engineering - Theoretical Computer Science

Table of contents 

Keynote Address.- Leaving Room for the Bad Guys.- Payment Systems.- Vulnerabilities in First-Generation RFID-enabled Credit Cards.- Conditional E-Cash.- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.- Panel.- Panel: RFID Security and Privacy.- Position Statement in RFID S&P Panel: RFID and the Middleman.- Position Statement in RFID S&P Panel: Contactless Smart Cards.- Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure.- Anonymity.- A Model of Onion Routing with Provable Anonymity.- K-Anonymous Multi-party Secret Handshakes.- Authentication.- Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups.- On Authentication with HMAC and Non-random Properties.- Anonymity and Privacy.- Hidden Identity-Based Signatures.- Space-Efficient Private Search with Applications to Rateless Codes.- Cryptography and Commercial Transactions.- Cryptographic Securities Exchanges.- Improved Multi-party Contract Signing.- Informant: Detecting Sybils Using Incentives.- Financial Transactions and Web Services.- Dynamic Virtual Credit Card Numbers.- The Unbearable Lightness of PIN Cracking.- Panel.- Virtual Economies: Threats and Risks.- Invited Talk.- Usable SPACE: Security, Privacy, and Context for the Mobile User.- System Presentation.- Personal Digital Rights Management for Mobile Cellular Devices.- Cryptography.- Certificate Revocation Using Fine Grained Certificate Space Partitioning.- An Efficient Aggregate Shuffle Argument Scheme.- Usable Security Workshop.- Preface.- Full Papers.- An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.- WSKE: Web Server Key Enabled Cookies.- Usability Analysis of Secure Pairing Methods.- Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.- Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers.- Short Papers.- What Instills Trust? A Qualitative Study of Phishing.- Phishing IQ Tests Measure Fear, Not Ability.- Mental Models of Security Risks.- Improving Usability by Adding Security to Video Conferencing Systems.- A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Data Encryption.