default search action
9th Financial Cryptography 2005: Roseau, The Commonwealth of Dominica
- Andrew S. Patrick, Moti Yung:
Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers. Lecture Notes in Computer Science 3570, Springer 2005, ISBN 3-540-26656-9
Threat and Attacks
- Gildas Avoine:
Fraud Within Asymmetric Multi-hop Cellular Networks. 1-15 - David Dagon, Wenke Lee, Richard J. Lipton:
Protecting Secret Data from Insider Attacks. 16-30 - Paul C. van Oorschot, Stuart G. Stubblebine:
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. 31-43
Invited Speaker
- Bezalel Gavish:
Trust and Swindling on the Internet. 44
Digital Signing Methods
- Fangguo Zhang, Willy Susilo, Yi Mu:
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). 45-56 - Yevgeniy Dodis, Dae Hyun Yum:
Time Capsule Signature. 57-71 - Walid Bagga, Refik Molva:
Policy-Based Cryptography and Applications. 72-87
Panel
- Richard Clayton, Drew Dean, Markus Jakobsson, Steven A. Myers, Stuart G. Stubblebine, Michael Szydlo:
A Chat at the Old Phishin' Hole. 88 - Markus Jakobsson:
Modeling and Preventing Phishing Attacks. 89 - Steven A. Myers:
Helping the Phish Detect the Lure. 90 - Richard Clayton:
Who'd Phish from the Summit of Kilimanjaro?. 91-92
Privacy
- Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner:
A Privacy-Protecting Coupon System. 93-108 - Aggelos Kiayias, Antonina Mitrofanova:
Testing Disjointness of Private Datasets. 109-124
Hardware Oriented Mechanisms
- Gildas Avoine, Philippe Oechslin:
RFID Traceability: A Multilayer Problem. 125-140 - Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey:
Information-Theoretic Security Analysis of Physical Uncloneable Functions. 141-155
Supporting Financial Transactions
- Michael Szydlo:
Risk Assurance for Hedge Funds Using Zero Knowledge Proofs. 156-171 - Stanislaw Jarecki, Vitaly Shmatikov:
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. 172-187
Systems, Applications, and Experiences
- Simson L. Garfinkel, Jeffrey I. Schiller, Erik Nordlander, David Margrave, Robert C. Miller:
Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce. 188-202 - Andrew Koyfman:
Securing Sensitive Data with the Ingrian DataSecure Platform. 203-210 - Lars Eilebrecht:
Ciphire Mail Email Encryption and Authentication. 211-224
Message Authentication
- Jeff King, André L. M. dos Santos:
A User-Friendly Approach to Human Authentication of Messages. 225-239 - Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, Gonzalo R. Arce:
Approximate Message Authentication and Biometric Entity Authentication. 240-254
Exchanges and Contracts
- Aybek Mukhamedov, Steve Kremer, Eike Ritter:
Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model. 255-269 - Keith B. Frikken, Mikhail J. Atallah:
Achieving Fairness in Private Contract Negotiation. 270-284
Auctions and Voting
- Edith Elkind, Helger Lipmaa:
Small Coalitions Cannot Manipulate Voting. 285-297 - Felix Brandt, Tuomas Sandholm:
Efficient Privacy-Preserving Protocols for Multi-unit Auctions. 298-312 - Eu-Jin Goh, Philippe Golle:
Event Driven Private Counters. 313-327
Works in Progress
- Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine:
Secure Distributed Human Computation. 328-332 - Koutarou Suzuki, Makoto Yokoo:
Secure Multi-attribute Procurement Auction. 333-335 - Fernando Godínez, Dieter Hutter, Raúl Monroy:
Audit File Reduction Using N-Gram Models. 336-340
User Authentication
- Michel Abdalla, David Pointcheval:
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. 341-356 - Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia:
Secure Biometric Authentication for Weak Computational Devices. 357-371 - Allan Friedman:
Panel Summary: Incentives, Markets and Information Security. 372-373
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.