Skip to main content
  • Conference proceedings
  • © 2008

Financial Cryptography and Data Security

12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5143)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FC: International Conference on Financial Cryptography and Data Security

Conference proceedings info: FC 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

  2. Attacks and Counter Measures I

    1. Quantifying Resistance to the Sybil Attack

      • N. Boris Margolin, Brian Neil Levine
      Pages 1-15
    2. Evaluating the Wisdom of Crowds in Assessing Phishing Websites

      • Tyler Moore, Richard Clayton
      Pages 16-30
    3. Protocols

      1. An Efficient Deniable Key Exchange Protocol (Extended Abstract)
        • Shaoquan Jiang, Reihaneh Safavi-Naini
        Pages 47-52
      2. Revisiting Pairing Based Group Key Exchange
        • Yvo Desmedt, Tanja Lange
        Pages 53-68
    4. Hardware, Chips and Tags

      1. Breaking Legacy Banking Standards with Special-Purpose Hardware
        • Tim Güneysu, Christof Paar
        Pages 128-140
      2. ePassport: Securing International Contacts with Contactless Chips
        • Gildas Avoine, Kassem Kalach, Jean-Jacques Quisquater
        Pages 141-155
      3. Good Variants of HB +  Are Hard to Find
        • Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin
        Pages 156-170
  3. Attacks and Counter-Measures II

    1. Weighing Down “The Unbearable Lightness of PIN Cracking”

      • Mohammad Mannan, P. C. van Oorschot
      Pages 176-181
    2. Phishwish: A Stateless Phishing Filter Using Minimal Rules

      • Debra L. Cook, Vijay K. Gurbani, Michael Daniluk
      Pages 182-186
    3. Competition and Fraud in Online Advertising Markets

      • Bob Mungamuru, Stephen Weis
      Pages 187-191
    4. Identity Theft: Much Too Easy? A Study of Online Systems in Norway

      • André N. Klingsheim, Kjell J. Hole
      Pages 192-196
    5. A Proof of Concept Attack against Norwegian Internet Banking Systems

      • Yngve Espelid, Lars–Helge Netland, André N. Klingsheim, Kjell J. Hole
      Pages 197-201
    6. Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash

      • Sébastien Canard, Aline Gouget, Jacques Traoré
      Pages 202-214

Other Volumes

  1. Financial Cryptography and Data Security

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial Cryptography and Data Security, FC 2008, held in Cozumel, Mexico, in January 2008. The 16 revised full papers and 9 revised short papers presented together with 5 poster papers, 2 panel reports, and 1 invited lecture were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on attacks and counter measures, protocols, theory, hardware, chips and tags, signatures and encryption, as well as anonymity and e-cash.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access