Financial cryptography and data security. 9th international conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 -- March 3, 2005. Revised papers. (Q2574757)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Financial cryptography and data security. 9th international conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 -- March 3, 2005. Revised papers. |
scientific article
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Financial cryptography and data security. 9th international conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 -- March 3, 2005. Revised papers. |
scientific article |
Statements
Financial cryptography and data security. 9th international conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 -- March 3, 2005. Revised papers. (English)
0 references
2 December 2005
0 references
The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1053.94001). Indexed articles: \textit{Avoine, Gildas}, Fraud within asymmetric multi-hop cellular networks, 1-15 [Zbl 1120.94306] \textit{Dagon, David; Lee, Wenke; Lipton, Richard}, Protecting secret data from insider attacks, 16-30 [Zbl 1120.94314] \textit{van Oorschot, Paul C.; Stubblebine, S.}, Countering identity theft through digital uniqueness, location cross-checking, and funneling, 31-43 [Zbl 1120.94335] \textit{Gavish, Bezalel}, Trust and swindling on the internet, 44 [Zbl 1120.68310] \textit{Zhang, Fangguo; Susilo, Willy; Mu, Yi}, Identity-based partial message recovery signatures (or how to shorten ID-based signatures), 45-56 [Zbl 1120.94334] \textit{Dodis, Yevgeniy; Yum, Dae Hyun}, Time capsule signature, 57-71 [Zbl 1120.94316] \textit{Bagga, Walid; Molva, Refik}, Policy-based cryptography and applications, 72-87 [Zbl 1120.94308] \textit{Clayton, Richard; Dean, Drew; Jakobsson, Markus; Myers, Steven; Stubblebine, Stuart; Szydlo, Michael}, A chat at the old phishin' hole, 88 [Zbl 1120.94313] \textit{Jakobsson, Markus}, Modeling and preventing phishing attacks, 89 [Zbl 1120.94324] \textit{Myers, Steven}, Helping the phish detect the lure, 90 [Zbl 1120.94330] \textit{Clayton, Richard}, Who'd phish from the summit of Kilimanjaro?, 91-92 [Zbl 1120.94312] \textit{Chen, Liqun; Enzmann, Matthias; Sadeghi, Ahmad-Reza; Schneider, Markus; Steiner, Michael}, A privacy-protecting coupon system, 93-108 [Zbl 1120.94311] \textit{Kiayias, Aggelos; Mitrofanova, Antonina}, Testing disjointness of private datasets, 109-124 [Zbl 1120.94326] \textit{Avoine, Gildas; Oechslin, Philippe}, RFID traceability: A multilayer problem, 125-140 [Zbl 1120.94307] \textit{Tuyls, P.; Škorić, B.; Stallinga, S.; Akkermans, A. H. M.; Ophey, W.}, Information-theoretic security analysis of physical uncloneable functions, 141-155 [Zbl 1120.94333] \textit{Szydlo, Michael}, Risk assurance for hedge funds using zero knowledge proofs, 156-171 [Zbl 1120.94332] \textit{Jarecki, Stanisław; Shmatikov, Vitaly}, Probabilistic escrow of financial transactions with cumulative threshold disclosure, 172-187 [Zbl 1120.94325] \textit{Garfinkel, Simson L.; Schiller, Jeffrey I.; Nordlander, Erik; Margrave, David; Miller, Robert C.}, Views, reactions and impact of digitally-signed mail in e-commerce, 188-202 [Zbl 1120.94321] \textit{Koyfman, Andrew}, Securing sensitive data with the Ingrian DataSecure platform, 203-210 [Zbl 1120.94328] \textit{Eilebrecht, Lars}, Ciphire Mail -- email encryption and authentication, 211-224 [Zbl 1120.94317] \textit{King, Jeff; dos Santos, Andre}, A user-friendly approach to human authentication of messages, 225-239 [Zbl 1120.94327] \textit{Di Crescenzo, G.; Graveman, R.; Ge, R.; Arce, G.}, Approximate message authentication and biometric entity authentication, 240-254 [Zbl 1120.94315] \textit{Mukhamedov, Aybek; Kremer, Steve; Ritter, Eike}, Analysis of a multi-party fair exchange protocol and formal proof of correctness in the strand space model, 255-269 [Zbl 1120.94329] \textit{Frikken, Keith; Atallah, Mikhail}, Achieving fairness in private contract negotiation, 270-284 [Zbl 1120.94320] \textit{Elkind, Edith; Lipmaa, Helger}, Small coalitions cannot manipulate voting, 285-297 [Zbl 1120.94318] \textit{Brandt, Felix; Sandholm, Tuomas}, Efficient privacy-preserving protocols for multi-unit auctions, 298-312 [Zbl 1120.94310] \textit{Goh, Eu-Jin; Golle, Philippe}, Event driven private counters, 313-327 [Zbl 1120.94323] \textit{Gentry, Craig; Ramzan, Zulfikar; Stubblebine, Stuart}, Secure distributed human computation, 328-332 [Zbl 1120.68346] \textit{Suzuki, Koutarou; Yokoo, Makoto}, Secure multi-attribute procurement auction, 333-335 [Zbl 1120.94331] \textit{Godínez, Fernando; Hutter, Dieter; Monroy, Raúl}, Audit file reduction using \(n\)-gram models, 336-340 [Zbl 1120.94322] \textit{Abdalla, Michel; Pointcheval, David}, Interactive Diffie-Hellman assumptions with applications to password-based authentication, 341-356 [Zbl 1120.94304] \textit{Atallah, Mikhail J.; Frikken, Keith B.; Goodrich, Michael T.; Tamassia, Roberto}, Secure biometric authentication for weak computational devices, 357-371 [Zbl 1120.94305] \textit{Friedman, Allan}, Panel summary: Incentives, markets and information security, 372-373 [Zbl 1120.94319]
0 references