Financial Cryptography and Data Security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers (Lecture Notes in Computer Science) (2013)

個数:

Financial Cryptography and Data Security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers (Lecture Notes in Computer Science) (2013)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 406 p.
  • 言語 ENG
  • 商品コード 9783642398834
  • DDC分類 005.8

Full Description

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval.

Contents

Keynote.- Can Nature Help Us Solve Risk Management Issues? Position Paper.- Electronic Payment (Bitcoin).- Quantitative Analysis of the Full Bitcoin Transaction Graph.- Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk (Short Paper).- Evaluating User Privacy in Bitcoin.- Usability Aspects.- The Importance of Being Earnest [In Security Warnings] (Short Paper).- Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing (Short Paper).- RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication (Short Paper).- Secure Computation.- Practical Fully Simulatable Oblivious Transfer with Sublinear Communication.- Unconditionally-Secure Robust Secret Sharing with Minimum Share Size.- A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data.- Passwords.- "Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks.- Hey, You, Get Off of My Clipboard: On How Usability Trumps Security in Android Password Managers.- Privacy Primitives and Non-repudiation.- Unique Ring Signatures: A Practical Construction (Short Paper).- Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency.- Accumulators and U-Prove Revocation (Short Paper).- Anonymity.- Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy (Short Paper).- P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems (Short Paper).- Hardware Security.- Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections (Short Paper).- Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study (Short Paper).- On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards (Short Paper).- Secure Computation and Secret Sharing.- Securely Solving Simple Combinatorial Graph Problems.- Parallel and Dynamic Searchable SymmetricEncryption.- GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.- Invited Talk.- The Untapped Potential of Trusted Execution Environments on Mobile Devices: Extended Abstract.- Authentication Attacks and Countermeasures.- Stark: Tamperproof Authentication to Resist Keylogging.- Risks of Offline Verify PIN on Contactless Cards (Short Paper).- How to Attack Two-Factor Authentication Internet Banking (Short Paper).- CAge: Taming Certificate Authorities by Inferring Restricted Scopes (Short Paper).- Privacy of Data and Communication.- Interdependent Privacy: Let Me Share Your Data.- A Secure Submission System for Online Whistle blowing Platforms (Short Paper).- Securing Anonymous Communication Channels under the Selective DoS Attack (Short Paper).- Private Data Retrieval.- PIRMAP: Efficient Private Information Retrieval for MapReduce.- Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates (Short Paper).- Posters.- Three-Factor User Authentication Method Using Biometrics Challenge Response.- Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services.- Onions for Sale: Putting Privacy on the Market.- Searchable Encryption Supporting General Boolean Expression Queries.- A Privacy Preserving E-Payment Architecture.- Communication Services Empowered with a Classical Chaos Based Cryptosystem.

最近チェックした商品