Atjaunināt sīkdatņu piekrišanu

E-grāmata: Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers

Edited by
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 10322
  • Izdošanas datums: 22-Dec-2017
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319709727
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 10322
  • Izdošanas datums: 22-Dec-2017
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319709727
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017.

The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API's; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval.

Privacy and Identity Management
An Efficient Self-blindable Attribute-Based Credential Scheme
3(18)
Sietse Ringers
Eric Verheul
Jaap-Henk Hoepman
Real Hidden Identity-Based Signatures
21(18)
Sherman S. M. Chow
Haibin Zhang
Tao Zhang
BehavioCog: An Observation Resistant Authentication Scheme
39(20)
Jagmohan Chauhan
Benjamin Zi Hao Zhao
Hassan Jameel Asghar
Jonathan Chan
Mohamed Ali Kaafar
Updatable Tokenization: Formal Definitions and Provably Secure Constructions
59(20)
Christian Cachin
Jan Camenisch
Eduarda Freire-Stogbuchner
Anja Lehmann
Privacy and Data Processing
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates
79(19)
Qian Wang
Kui Ren
Minxin Du
Qi Li
Aziz Mohaisen
Outsourcing Medical Dataset Analysis: A Possible Solution
98(26)
Gabriel Kaptchuk
Matthew Green
Aviel Rubin
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
124(21)
David Derler
Sebastian Ramacher
Daniel Slamanig
Cryptographic Primitives and API's
A Provably Secure PKCS#11 Configuration Without Authenticated Attributes
145(18)
Ryan Stanley-Oakes
A Post-quantum Digital Signature Scheme Based on Supersingular Isogenics
163(19)
Youngho Yoo
Reza Azarderakhsh
Amir Jalali
David Jao
Vladimir Soukharev
Optimally Sound Sigma Protocols Under DCRA
182(22)
Helger Lipmaa
Economically Optimal Variable Tag Length Message Authentication
204(23)
Reihaneh Safavi-Naini
Viliam Lisy
Yvo Desmedt
Vulnerabilities and Exploits
PEEP: Passively Eavesdropping Private Input via Brainwave Signals
227(20)
Ajaya Neupane
Md. Lutfor Rahman
Nitesh Saxena
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript
247(21)
Michael Schwarz
Clementine Maurice
Daniel Gruss
Stefan Mangard
Attacks on Secure Logging Schemes
268(17)
Gunnar Hartung
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS
285(17)
Matthew Smith
Daniel Moser
Martin Strohmeier
Vincent Lenders
Ivan Martinovic
Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store
302(8)
Vincent F. Taylor
Ivan Martinovic
Short Paper: Addressing Sophisticated Email Attacks
310(11)
Markus Jakobsson
Blockchain Technology
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin
321(19)
Steven Goldfeder
Joseph Bonneau
Rosario Gennaro
Arvind Narayanan
Trust Is Risk: A Decentralized Financial Trust Platform
340(17)
Orfeas Stefanos Thyfronitis Litos
Dionysis Zindros
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
357(19)
Patrick McCorry
Siamak F. Shahandashti
Feng Hao
Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies
376(17)
Leonid Reyzin
Dmitry Meshkov
Alexander Chepurnoy
Sasha Ivanov
Short Paper: Service-Oriented Sharding for Blockchains
393(12)
Adem Efe Gencer
Robbert van Renesse
Emin Gun Sirer
Security of Internet Protocols
The Security of NTP's Datagram Protocol
405(19)
Aanchal Malhotra
Matthew Van Gundy
Mayank Varia
Haydn Kennedy
Jonathan Gardner
Sharon Goldberg
Short Paper: On Deployment of DNS-Based Security Enhancements
424(13)
Pawel Szalachowski
Adrian Perrig
Blind Signatures
A Practical Multivariate Blind Signature Scheme
437(18)
Albrecht Petzoldt
Alan Szepieniec
Mohamed Saied Emam Mohamed
Efficient Round-Optimal Blind Signatures in the Standard Model
455(22)
Essam Ghadafi
Searching and Processing Private Data
Secure Multiparty Computation from SGX
477(21)
Raad Bahmani
Manuel Barbosa
Ferdinand Brasser
Bernardo Portela
Ahmad-Reza Sadeghi
Guillaume Scerri
Bogdan Warinschi
Efficient No-dictionary Verifiable Searchable Symmetric Encryption
498(19)
Wakaha Ogata
Kaoru Kurosawa
Faster Homomorphic Evaluation of Discrete Fourier Transforms
517(16)
Anamaria Costache
Nigel P. Smart
Srinivas Vivek
Secure Channel Protocols
Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers
533(9)
Nayanamana Samarasinghe
Mohammad Mannan
Unilaterally-Authenticated Key Exchange
542(19)
Yevgeniy Dodis
Dario Fiore
Formal Modeling and Verification for Domain Validation and ACME
561(18)
Karthikeyan Bhargavan
Antoine Delignat-Lavaud
Nadim Kobeissi
Why Banker Bob (Still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps
579(22)
Tom Chothia
Flavio D. Garcia
Chris Heppel
Chris McMahon Stone
Privacy in Data Storage and Retrieval
Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage
601(20)
Cecylia Bocovich
John A. Doucette
Ian Goldberg
A Simpler Rate-Optimal CPIR Protocol
621(20)
Helger Lipmaa
Kateryna Pavlyk
Poster Papers
Accountability and Integrity for Data Management Using Blockchains
641(2)
Anirban Basu
Joshua Jeeson Daniel
Sushmita Ruj
Mohammad Shahriar Rahman
Theo Dimitrakos
Shinsaku Kiyomoto
The Amount as a Predictor of Transaction Fraud
643(1)
Niek J. Bouman
Martha E. Nikolaou
Σ-State Authentication Language, an Alternative to Bitcoin Script
644(2)
Alexander Chepurnoy
Broker-Mediated Trade Finance with Blockchains
646(1)
Mohammad Shahriar Rahman
Anirban Basu
Shinsaku Kiyomoto
OpenTimestamps: Securing Software Updates Using the Bitcoin Blockchain
647(2)
Peter Todd
Harry Halpin
Author Index 649