Financial Cryptography and Data Security: 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 4886

ISBN: 3540773657, 9783540773658

Size: 6 MB (6238817 bytes)

Pages: 392/418

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Mike Bond (auth.), Sven Dietrich, Rachna Dhamija (eds.)3540773657, 9783540773658

The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http://fc07. ifca. ai), organized by the International Financial Crypt- raphy Association (IFCA, http://www. ifca. ai/), was held in Tobago, February 12–15, 2007. The conference is a well-established and premier international – rum for research, advanced development, education, exploration, and debate – garding security in the context of ?nance and commerce. We continue to cover all aspects of securing transactions and systems, which this year included a range of technical areas such as cryptography, payment systems, anonymity, privacy, – thentication, and commercial and ?nancial transactions. For the ?rst time, there was an adjacent workshop on Usable Security, held after FC 2007 in the same – cation. The papers are included in the last part of this volume. The conference goal was to bring together top cryptographers, data-security specialists, and c- puter scientists with economists, bankers, implementers, and policy makers. The goal was met this year: there were 85 submissions, out of which 17 research papers and 1 system presentation paper were accepted. In addition, the conference featured two distinguished speakers, Mike Bond and Dawn Jutla, and two panel sessions, one on RFID and one on virtual economies. As always, there was the rump session on Tuesday evening, colorful as usual.

Table of contents :
Front Matter….Pages –
Leaving Room for the Bad Guys….Pages 1-1
Vulnerabilities in First-Generation RFID-enabled Credit Cards….Pages 2-14
Conditional E-Cash….Pages 15-28
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting….Pages 29-44
Panel: RFID Security and Privacy….Pages 45-45
Position Statement in RFID S&P Panel: RFID and the Middleman….Pages 46-49
Position Statement in RFID S&P Panel: Contactless Smart Cards….Pages 50-52
Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure….Pages 53-56
A Model of Onion Routing with Provable Anonymity….Pages 57-71
K -Anonymous Multi-party Secret Handshakes….Pages 72-87
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer….Pages 88-103
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups….Pages 104-118
On Authentication with HMAC and Non-random Properties….Pages 119-133
Hidden Identity-Based Signatures….Pages 134-147
Space-Efficient Private Search with Applications to Rateless Codes….Pages 148-162
Cryptographic Securities Exchanges….Pages 163-178
Improved Multi-party Contract Signing….Pages 179-191
Informant: Detecting Sybils Using Incentives….Pages 192-207
Dynamic Virtual Credit Card Numbers….Pages 208-223
The Unbearable Lightness of PIN Cracking….Pages 224-238
Virtual Economies: Threats and Risks….Pages 239-244
Usable SPACE: Security, Privacy, and Context for the Mobile User….Pages 245-245
Personal Digital Rights Management for Mobile Cellular Devices….Pages 246-246
Certificate Revocation Using Fine Grained Certificate Space Partitioning….Pages 247-259
An Efficient Aggregate Shuffle Argument Scheme….Pages 260-274
Front Matter….Pages 275-275
Preface….Pages 277-279
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks….Pages 281-293
WSKE: Web Server Key Enabled Cookies….Pages 294-306
Usability Analysis of Secure Pairing Methods….Pages 307-324
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup….Pages 325-340
Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers….Pages 341-355
What Instills Trust? A Qualitative Study of Phishing….Pages 356-361
Phishing IQ Tests Measure Fear, Not Ability….Pages 362-366
Mental Models of Security Risks….Pages 367-377
Improving Usability by Adding Security to Video Conferencing Systems….Pages 378-382
A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?….Pages 383-388
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Financial Cryptography and Data Security: 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers”
Shopping Cart
Scroll to Top