Mike Bond (auth.), Sven Dietrich, Rachna Dhamija (eds.)3540773657, 9783540773658
Table of contents :
Front Matter….Pages –
Leaving Room for the Bad Guys….Pages 1-1
Vulnerabilities in First-Generation RFID-enabled Credit Cards….Pages 2-14
Conditional E-Cash….Pages 15-28
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting….Pages 29-44
Panel: RFID Security and Privacy….Pages 45-45
Position Statement in RFID S&P Panel: RFID and the Middleman….Pages 46-49
Position Statement in RFID S&P Panel: Contactless Smart Cards….Pages 50-52
Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure….Pages 53-56
A Model of Onion Routing with Provable Anonymity….Pages 57-71
K -Anonymous Multi-party Secret Handshakes….Pages 72-87
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer….Pages 88-103
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups….Pages 104-118
On Authentication with HMAC and Non-random Properties….Pages 119-133
Hidden Identity-Based Signatures….Pages 134-147
Space-Efficient Private Search with Applications to Rateless Codes….Pages 148-162
Cryptographic Securities Exchanges….Pages 163-178
Improved Multi-party Contract Signing….Pages 179-191
Informant: Detecting Sybils Using Incentives….Pages 192-207
Dynamic Virtual Credit Card Numbers….Pages 208-223
The Unbearable Lightness of PIN Cracking….Pages 224-238
Virtual Economies: Threats and Risks….Pages 239-244
Usable SPACE: Security, Privacy, and Context for the Mobile User….Pages 245-245
Personal Digital Rights Management for Mobile Cellular Devices….Pages 246-246
Certificate Revocation Using Fine Grained Certificate Space Partitioning….Pages 247-259
An Efficient Aggregate Shuffle Argument Scheme….Pages 260-274
Front Matter….Pages 275-275
Preface….Pages 277-279
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks….Pages 281-293
WSKE: Web Server Key Enabled Cookies….Pages 294-306
Usability Analysis of Secure Pairing Methods….Pages 307-324
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup….Pages 325-340
Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers….Pages 341-355
What Instills Trust? A Qualitative Study of Phishing….Pages 356-361
Phishing IQ Tests Measure Fear, Not Ability….Pages 362-366
Mental Models of Security Risks….Pages 367-377
Improving Usability by Adding Security to Video Conferencing Systems….Pages 378-382
A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?….Pages 383-388
Back Matter….Pages –
Reviews
There are no reviews yet.