Financial cryptography and data security. 9th international conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 -- March 3, 2005. Revised papers. (Q2574757)

From MaRDI portal





scientific article
Language Label Description Also known as
English
Financial cryptography and data security. 9th international conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 -- March 3, 2005. Revised papers.
scientific article

    Statements

    Financial cryptography and data security. 9th international conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 -- March 3, 2005. Revised papers. (English)
    0 references
    2 December 2005
    0 references
    The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1053.94001). Indexed articles: \textit{Avoine, Gildas}, Fraud within asymmetric multi-hop cellular networks, 1-15 [Zbl 1120.94306] \textit{Dagon, David; Lee, Wenke; Lipton, Richard}, Protecting secret data from insider attacks, 16-30 [Zbl 1120.94314] \textit{van Oorschot, Paul C.; Stubblebine, S.}, Countering identity theft through digital uniqueness, location cross-checking, and funneling, 31-43 [Zbl 1120.94335] \textit{Gavish, Bezalel}, Trust and swindling on the internet, 44 [Zbl 1120.68310] \textit{Zhang, Fangguo; Susilo, Willy; Mu, Yi}, Identity-based partial message recovery signatures (or how to shorten ID-based signatures), 45-56 [Zbl 1120.94334] \textit{Dodis, Yevgeniy; Yum, Dae Hyun}, Time capsule signature, 57-71 [Zbl 1120.94316] \textit{Bagga, Walid; Molva, Refik}, Policy-based cryptography and applications, 72-87 [Zbl 1120.94308] \textit{Clayton, Richard; Dean, Drew; Jakobsson, Markus; Myers, Steven; Stubblebine, Stuart; Szydlo, Michael}, A chat at the old phishin' hole, 88 [Zbl 1120.94313] \textit{Jakobsson, Markus}, Modeling and preventing phishing attacks, 89 [Zbl 1120.94324] \textit{Myers, Steven}, Helping the phish detect the lure, 90 [Zbl 1120.94330] \textit{Clayton, Richard}, Who'd phish from the summit of Kilimanjaro?, 91-92 [Zbl 1120.94312] \textit{Chen, Liqun; Enzmann, Matthias; Sadeghi, Ahmad-Reza; Schneider, Markus; Steiner, Michael}, A privacy-protecting coupon system, 93-108 [Zbl 1120.94311] \textit{Kiayias, Aggelos; Mitrofanova, Antonina}, Testing disjointness of private datasets, 109-124 [Zbl 1120.94326] \textit{Avoine, Gildas; Oechslin, Philippe}, RFID traceability: A multilayer problem, 125-140 [Zbl 1120.94307] \textit{Tuyls, P.; Škorić, B.; Stallinga, S.; Akkermans, A. H. M.; Ophey, W.}, Information-theoretic security analysis of physical uncloneable functions, 141-155 [Zbl 1120.94333] \textit{Szydlo, Michael}, Risk assurance for hedge funds using zero knowledge proofs, 156-171 [Zbl 1120.94332] \textit{Jarecki, Stanisław; Shmatikov, Vitaly}, Probabilistic escrow of financial transactions with cumulative threshold disclosure, 172-187 [Zbl 1120.94325] \textit{Garfinkel, Simson L.; Schiller, Jeffrey I.; Nordlander, Erik; Margrave, David; Miller, Robert C.}, Views, reactions and impact of digitally-signed mail in e-commerce, 188-202 [Zbl 1120.94321] \textit{Koyfman, Andrew}, Securing sensitive data with the Ingrian DataSecure platform, 203-210 [Zbl 1120.94328] \textit{Eilebrecht, Lars}, Ciphire Mail -- email encryption and authentication, 211-224 [Zbl 1120.94317] \textit{King, Jeff; dos Santos, Andre}, A user-friendly approach to human authentication of messages, 225-239 [Zbl 1120.94327] \textit{Di Crescenzo, G.; Graveman, R.; Ge, R.; Arce, G.}, Approximate message authentication and biometric entity authentication, 240-254 [Zbl 1120.94315] \textit{Mukhamedov, Aybek; Kremer, Steve; Ritter, Eike}, Analysis of a multi-party fair exchange protocol and formal proof of correctness in the strand space model, 255-269 [Zbl 1120.94329] \textit{Frikken, Keith; Atallah, Mikhail}, Achieving fairness in private contract negotiation, 270-284 [Zbl 1120.94320] \textit{Elkind, Edith; Lipmaa, Helger}, Small coalitions cannot manipulate voting, 285-297 [Zbl 1120.94318] \textit{Brandt, Felix; Sandholm, Tuomas}, Efficient privacy-preserving protocols for multi-unit auctions, 298-312 [Zbl 1120.94310] \textit{Goh, Eu-Jin; Golle, Philippe}, Event driven private counters, 313-327 [Zbl 1120.94323] \textit{Gentry, Craig; Ramzan, Zulfikar; Stubblebine, Stuart}, Secure distributed human computation, 328-332 [Zbl 1120.68346] \textit{Suzuki, Koutarou; Yokoo, Makoto}, Secure multi-attribute procurement auction, 333-335 [Zbl 1120.94331] \textit{Godínez, Fernando; Hutter, Dieter; Monroy, Raúl}, Audit file reduction using \(n\)-gram models, 336-340 [Zbl 1120.94322] \textit{Abdalla, Michel; Pointcheval, David}, Interactive Diffie-Hellman assumptions with applications to password-based authentication, 341-356 [Zbl 1120.94304] \textit{Atallah, Mikhail J.; Frikken, Keith B.; Goodrich, Michael T.; Tamassia, Roberto}, Secure biometric authentication for weak computational devices, 357-371 [Zbl 1120.94305] \textit{Friedman, Allan}, Panel summary: Incentives, markets and information security, 372-373 [Zbl 1120.94319]
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references