Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, by Giovanni Di CrescenzoFinancial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British West Indies, February 27 - March 2, 2006, by Giovanni Di Crescenzo

Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British…

byGiovanni Di CrescenzoEditorAvi Rubin

Paperback | September 27, 2006

Pricing and Purchase Info

$150.50

Earn 753 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data Security, FC 2006, held in Anguilla, British West Indies in February/March 2006. The 19 revised full papers and six revised short papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections.

Title:Financial Cryptography and Data Security: 10th International Conference, FC 2006 Anguilla, British…Format:PaperbackDimensions:327 pages, 23.5 × 15.5 × 1.73 inPublished:September 27, 2006Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540462554

ISBN - 13:9783540462552

Reviews

Table of Contents

Authentication and Fraud Detection.- Phoolproof Phishing Prevention.- A Protocol for Secure Public Instant Messaging.- Using Automated Banking Certificates to Detect Unauthorised Financial Transactions.- Privacy.- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption.- A Private Stable Matching Algorithm.- Private Policy Negotiation.- Reputation and Mix-Nets.- Uncheatable Reputation for Distributed Computation Markets.- An Efficient Publicly Verifiable Mix-Net for Long Inputs.- Auditable Privacy: On Tamper-Evident Mix Networks.- Short Papers.- A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation.- Defeating Malicious Servers in a Blind Signatures Based Voting System.- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng.- Credit Transfer for Market-Based Infrastructure.- A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions.- Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones.- Conditional Financial Cryptography.- A Generic Construction for Token-Controlled Public Key Encryption.- Timed-Release and Key-Insulated Public Key Encryption.- Conditional Encrypted Mapping and Comparing Encrypted Numbers.- Revisiting Oblivious Signature-Based Envelopes.- Payment Systems.- Provably Secure Electronic Cash Based on Blind Multisignature Schemes.- Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.- Privacy-Protecting Coupon System Revisited.- Efficient Protocols.- Efficient Broadcast Encryption Scheme with Log-Key Storage.- Efficient Correlated Action Selection.- Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination.