Skip to main content
  • Conference proceedings
  • © 2006

Financial Cryptography and Data Security

10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4107)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FC: International Conference on Financial Cryptography and Data Security

Conference proceedings info: FC 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Authentication and Fraud Detection

    1. Phoolproof Phishing Prevention

      • Bryan Parno, Cynthia Kuo, Adrian Perrig
      Pages 1-19
    2. A Protocol for Secure Public Instant Messaging

      • Mohammad Mannan, Paul C. van Oorschot
      Pages 20-35
    3. Using Automated Banking Certificates to Detect Unauthorised Financial Transactions

      • C. Corzo, F. Corzo S., N. Zhang, A. Carpenter
      Pages 36-51
  3. Privacy

    1. A Private Stable Matching Algorithm

      • Philippe Golle
      Pages 65-80
    2. Private Policy Negotiation

      • Klaus Kursawe, Gregory Neven, Pim Tuyls
      Pages 81-95
  4. Reputation and Mix-Nets

    1. Uncheatable Reputation for Distributed Computation Markets

      • Bogdan Carbunar, Radu Sion
      Pages 96-110
    2. An Efficient Publicly Verifiable Mix-Net for Long Inputs

      • Jun Furukawa, Kazue Sako
      Pages 111-125
    3. Auditable Privacy: On Tamper-Evident Mix Networks

      • Jong Youl Choi, Philippe Golle, Markus Jakobsson
      Pages 126-141
  5. Short Papers

    1. A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation

      • Peter Bogetoft, Ivan DamgÃ¥rd, Thomas Jakobsen, Kurt Nielsen, Jakob Pagter, Tomas Toft
      Pages 142-147
    2. Defeating Malicious Servers in a Blind Signatures Based Voting System

      • Sébastien Canard, Matthieu Gaud, Jacques Traoré
      Pages 148-153
  6. Conditional Financial Cryptography

    1. A Generic Construction for Token-Controlled Public Key Encryption

      • David Galindo, Javier Herranz
      Pages 177-190
    2. Timed-Release and Key-Insulated Public Key Encryption

      • Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
      Pages 191-205
    3. Conditional Encrypted Mapping and Comparing Encrypted Numbers

      • Ian F. Blake, Vladimir Kolesnikov
      Pages 206-220
    4. Revisiting Oblivious Signature-Based Envelopes

      • Samad Nasserian, Gene Tsudik
      Pages 221-235

Other Volumes

  1. Financial Cryptography and Data Security

Editors and Affiliations

  • Telcordia Technologies, Piscataway, USA

    Giovanni Crescenzo

  • Johns Hopkins University (JHUISI), Baltimor, USA

    Avi Rubin

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access