Financial Cryptography and Data Security Front Cover

Financial Cryptography and Data Security

  • Length: 334 pages
  • Edition: 2012
  • Publisher:
  • Publication Date: 2012-01-11
  • ISBN-10: 3642275753
  • ISBN-13: 9783642275753
Description

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St. Lucia, in February/March 2011. The 16 revised full papers and 10 revised short papers presented were carefully reviewed and selected from 65 initial submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on fundamental and applied real-world deployments on all aspects surrounding commerce security; as well as on systems security and inter-disciplinary efforts.

Table of Contents

Chapter 1 Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data
Chapter 2 It’s All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice
Chapter 3 Evaluating the Privacy Risk of Location-Based Services
Chapter 4 Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance
Chapter 5 Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection
Chapter 6 Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools
Chapter 7 A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper)
Chapter 8 Impeding Individual User Profiling in Shopper Loyalty Programs
Chapter 9 Beyond Risk-Based Access Control: Towards Incentive-Based Access Control
Chapter 10 Authenticated Key Exchange under Bad Randomness
Chapter 11 Oblivious Outsourced Storage with Delegation
Chapter 12 Homomorphic Signatures for Digital Photographs
Chapter 13 Revisiting the Computational Practicality of Private Information Retrieval
Chapter 14 Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper)
Chapter 15 A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time
Chapter 16 An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs
Chapter 17 Peeling Away Layers of an RFID Security System
Chapter 18 Might Financial Cryptography Kill Financial Innovation? – The Curious Case of EMV
Chapter 19 hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers
Chapter 20 Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper)
Chapter 21 Proximax: Measurement-Driven Proxy Dissemination
Chapter 22 BNymble More Anonymous Blacklisting at Almost No Cost (A Short Paper)
Chapter 23 Towards Secure Bioinformatics Services
Chapter 24 Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications
Chapter 25 Re-evaluating the Wisdom of Crowds in Assessing Web Security
Chapter 26 Mercury: Recovering Forgotten Passwords Using Personal Devices

To access the link, solve the captcha.