Financial Cryptography and Data Security Front Cover

Financial Cryptography and Data Security

  • Length: 650 pages
  • Edition: 1st ed. 2017
  • Publisher:
  • Publication Date: 2018-01-27
  • ISBN-10: 3319709712
  • ISBN-13: 9783319709710
  • Sales Rank: #8097641 (See Top 100 Books)
Description

Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers (Lecture Notes in Computer Science)

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017.

The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API’s; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval.

Table of Contents

Chapter 1. An Efficient Self-blindable Attribute-Based Credential Scheme
Chapter 2. Real Hidden Identity-Based Signatures
Chapter 3. BehavioCog: An Observation Resistant Authentication Scheme
Chapter 4. Updatable Tokenization: Formal Definitions and Provably Secure Constructions
Chapter 5. SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates
Chapter 6. Outsourcing Medical Dataset Analysis: A Possible Solution
Chapter 7. Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
Chapter 8. A Provably Secure PKCS#11 Configuration Without Authenticated Attributes
Chapter 9. A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
Chapter 10. Optimally Sound Sigma Protocols Under DCRA
Chapter 11. Economically Optimal Variable Tag Length Message Authentication
Chapter 12. PEEP: Passively Eavesdropping Private Input via Brainwave Signals
Chapter 13. Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript
Chapter 14. Attacks on Secure Logging Schemes
Chapter 15. Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS
Chapter 16. Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store
Chapter 17. Short Paper: Addressing Sophisticated Email Attacks
Chapter 18. Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin
Chapter 19. Trust Is Risk: A Decentralized Financial Trust Platform
Chapter 20. A Smart Contract for Boardroom Voting with Maximum Voter Privacy
Chapter 21. Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies
Chapter 22. Short Paper: Service-Oriented Sharding for Blockchains
Chapter 23. The Security of NTP’s Datagram Protocol
Chapter 24. Short Paper: On Deployment of DNS-Based Security Enhancements
Chapter 25. A Practical Multivariate Blind Signature Scheme
Chapter 26. Efficient Round-Optimal Blind Signatures in the Standard Model
Chapter 27. Secure Multiparty Computation from SGX
Chapter 28. Efficient No-dictionary Verifiable Searchable Symmetric Encryption
Chapter 29. Faster Homomorphic Evaluation of Discrete Fourier Transforms
Chapter 30. Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers
Chapter 31. Unilaterally-Authenticated Key Exchange
Chapter 32. Formal Modeling and Verification for Domain Validation and ACME
Chapter 33. Why Banker Bob (Still) Can’t Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps
Chapter 34. Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage
Chapter 35. A Simpler Rate-Optimal CPIR Protocol

To access the link, solve the captcha.