1 - 20
Next
- FC (Conference) (10th : 2006 : Anguilla)
- Berlin ; New York : Springer, c2006.
- Description
- Book — xi, 325 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data Security, FC 2006, held in Anguilla, British West Indies in February/March 2006. The 19 revised full papers and 6 revised short papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on authentication and fraud detection, privacy, reputation and mix-nets, conditional financial cryptography, payment systems, and efficient protocols.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
HG1710 .F35 2006 | Available |
- FC (Conference) (9th : 2005 : Roseau, Dominica)
- Berlin ; New York : Springer, 2005.
- Description
- Book — xii, 376 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the thoroughly refereed post-proceedings of the 9th International Conference on Financial Cryptography and Data Security, FC 2005, held in Roseau, The Commonwealth Of Dominica, in February/March 2005.The 24 revised full papers presented together with the abstracts of one invited talk and 2 panel statements were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on threat and attacks, digital signing methods, privacy, hardware oriented mechanisms, supporting financial transactions, systems, applications, and experiences, message authentication, exchanges and contracts, auctions and voting, and user authentication.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
HG1710 .F35 2005 | Available |
- FC 2005 (2005 : Roseau, Dominica)
- Berlin ; New York : Springer, c2005.
- Description
- Book — xii, 376 p. : ill.
- FC (Conference) (8th : 2004 : Key West, Fla.)
- Berlin : Springer, 2004.
- Description
- Book — xi, 280 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the thoroughly refereed post-proceedings of the 8th International Conference on Financial Cryptography, FC 2004, held in Key West, FL, USA, in February 2004. The 17 revised full papers presented together with abstracts of 4 invited talks and 4 panel statements were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on loyalty and micropayment systems, user authentication, e-voting, auctions and lotteries, game theoretic and cryptographic tools, and mix networks and anonymous communications.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
HG1710 .F35 2004 | Available |
- FC (Conference) (6th : 2002 : Southampton, Bermuda Islands)
- Berlin ; New York : Springer, c2003.
- Description
- Book — viii, 299 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Financial Cryptography, FC 2002, held in Southampton, Bermuda, in March 2002. The 19 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on voting and recommending, auctions, cryptography, digital signature schemes, thresholds and secret sharing, and anonymity and digital payment systems.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
HG1710 .F35 2002 | Available |
- FC (Conference) (7th : 2003 : Guadeloupe)
- Berlin ; New York : Springer, c2003.
- Description
- Book — viii, 320 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the thoroughly refereed postproceedings of the 7th International Conference on Financial Cryptography, FC 2003, held in Guadeloupe, French West Indies, in January 2003.The 17 revised full papers presented together with 5 panel position papers were carefully reviewed and selected from 54 submissions. The papers are organized in topical sections on micropayment and e-cash; security, anonymity, and privacy; attacks; fair exchange; auctions; and cryptographic tools and primitives.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
HG1710 .F35 2003 | Available |
- FC (Conference) (5th : 2001 : Grand Cayman Island, Cayman Islands)
- Berlin ; New York : Springer, c2002.
- Description
- Book — ix, 377 p. : ill. ; 24 cm.
- Summary
-
- Managing Payment Transaction Costs.- Amortized E-Cash.- Offline Micropayments without Trusted Hardware.- Panel (I).- The Practical Problems of Implementing MicroMint.- Protecting Digital Rights.- Aspects of Digital Rights Management and the Use of Hardware Security Devices.- A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data.- Golden Times for Digital Rights Management?.- Applicability of Public Key Cryptosystems to Digital Rights Management Applications.- Trust and Risk Management.- On the Global Content PMI: Improved Copy-Protected Internet Content Distribution.- Trust: A Collision of Paradigms.- Groups and Anonymity.- On the Security of Homage Group Authentication Protocol.- Anonymity without `Cryptography'.- Fair Tracing without Trustees.- Invited Talk.- Why the War on Money Laundering Should Be Aborted.- Certificates and Authentication.- Provably Secure Implicit Certificate Schemes.- Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation.- Mutual Authentication for Low-Power Mobile Devices.- Credit Card Security.- Off-Line Generation of Limited-Use Credit Card Numbers.- A Security Framework for Card-Based Systems.- SecureClick: A Web Payment System with Disposable Credit Card Numbers.- Panel (II).- The Business of Electronic Voting.- Markets and Multiparty Computation.- Privacy for the Stock Market.- Secure Distributed Computing in a Commercial Environment.- Signatures in Financial Cryptography.- Monotone Signatures.- The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme.- Optimistic Fair Exchange with Transparent Signature Recovery.- Auctions.- (M + 1)st-Price Auction Protocol.- Non-interactive Private Auctions.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
HG1710 .F35 2001 | Available |
- FC 2001 (2001 : Grand Cayman Island, Cayman Islands)
- Berlin ; New York : Springer, c2002.
- Description
- Book — ix, 377 p. : ill.
- Summary
-
- Managing Payment Transaction Costs.- Amortized E-Cash.- Offline Micropayments without Trusted Hardware.- Panel (I).- The Practical Problems of Implementing MicroMint.- Protecting Digital Rights.- Aspects of Digital Rights Management and the Use of Hardware Security Devices.- A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data.- Golden Times for Digital Rights Management?.- Applicability of Public Key Cryptosystems to Digital Rights Management Applications.- Trust and Risk Management.- On the Global Content PMI: Improved Copy-Protected Internet Content Distribution.- Trust: A Collision of Paradigms.- Groups and Anonymity.- On the Security of Homage Group Authentication Protocol.- Anonymity without `Cryptography'.- Fair Tracing without Trustees.- Invited Talk.- Why the War on Money Laundering Should Be Aborted.- Certificates and Authentication.- Provably Secure Implicit Certificate Schemes.- Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation.- Mutual Authentication for Low-Power Mobile Devices.- Credit Card Security.- Off-Line Generation of Limited-Use Credit Card Numbers.- A Security Framework for Card-Based Systems.- SecureClick: A Web Payment System with Disposable Credit Card Numbers.- Panel (II).- The Business of Electronic Voting.- Markets and Multiparty Computation.- Privacy for the Stock Market.- Secure Distributed Computing in a Commercial Environment.- Signatures in Financial Cryptography.- Monotone Signatures.- The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme.- Optimistic Fair Exchange with Transparent Signature Recovery.- Auctions.- (M + 1)st-Price Auction Protocol.- Non-interactive Private Auctions.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- FC (Conference) (4th : 2000 : Anguilla)
- New York : Springer, 2001.
- Description
- Book — xi, 378 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the thoroughly refereed post-proceedings of the 4th International Conference on Financial Cryptography, FC 2000, held in Anguilla, British West Indies, in February 2000. The 21 revised full papers presented together with two invited papers and two tool summaries were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on digitial rights management, payment systems, finanical cryptography tools, electronic postcards, abusers of systems, financial cryptopolicies and issues, anonymity, and systems architecture.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
HG1710 .F35 2000 | Available |
- FC (Conference) (3rd : 1999 : Anguilla)
- Berlin : Springer, 1999.
- Description
- Book
- Summary
-
- Electronic Commerce.- Experimenting with Electronic Commerce on the PalmPilot.- Blinding of Credit Card Numbers in the SET Protocol.- Anonymity Control.- Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing.- Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems.- Fraud Management.- Risk Management for E-Cash Systems with Partial Real-Time Audit.- Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash.- Public-Key Certificates.- Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys.- Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance.- Steganography.- Playing 'Hide and Seek' with Stored Keys.- On Channel Capacity and Modulation of Watermarks in Digital Still Images.- Content Distribution.- Towards Making Broadcast Encryption Practical.- Conditional Access Concepts and Principles.- Fair Use, Intellectual Property, and the Information Economy.- Anonymity Mechanisms.- Anonymous Authentication of Membership in Dynamic Groups.- Some Open Issues and New Directions in Group Signatures.- Auctions and Markets.- Anonymous Investing: Hiding the Identities of Stockholders.- Fair On-Line Auctions without Special Trusted Parties.- Auctions and Markets.- Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control".- Improved Magic Ink Signatures Using Hints.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- FC (Conference) (2nd : 1998 : Anguilla)
- New York : Springer, 1998.
- Description
- Book — viii, 310 p. : ill. ; 24 cm.
- Summary
-
This book constitutes the thoroughly revised post-conference proceedings of the Second International Conference on Financial Cryptography, FC '98, held in Anguilla, British West Indies, in February 1998. The 28 revised papers presented were carefully selected and improved beyond the versions presented at the meeting. The book presents the state of the art in research and development in financial cryptography and addresses all current topics such as electronic payment systems, digital cash, electronic commerce, digital signatures, payment transactions, revocation and validation, WWW commerce, trust management systems, and watermarking.
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
HG1710 .F35 1998 | Available |
- FC (Conference) (1st : 1997 : Anguilla)
- Berlin ; New York : Springer, c1997.
- Description
- Book — xi, 407 p. : ill. ; 24 cm.
- Summary
-
- The 31 revised contributions presented were carefully reviewed and revised for inclusion in the book. The book provides a unique synopsis on financial cryptography, taking into account the views and ideas of cryptographers, security experts, computer hackers, lawyers, bankers, journalists and administrative professionals. The papers cover the whole spectrum of the security of financial transactions or digital commerce in general, ranging from pure cryptosystems to the technology of electronic money to legal and regulatory policy issues.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
HG1710 .F35 1997 | Available |
- FC 2008 (2008 : Cozumel, Mexico)
- Berlin ; New York : Springer-Verlag, c2008.
- Description
- Book — xiii, 326 p. : ill.
- FC (Conference) (12th : 2008 : Cozumel, Mexico)
- Berlin ; New York : Springer-Verlag, c2008.
- Description
- Book — xiii, 326 p. : ill. (some col.) ; 24 cm.
- Summary
-
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial Cryptography and Data Security, FC 2008, held in Cozumel, Mexico, in January 2008. The 16 revised full papers and 9 revised short papers presented together with 5 poster papers, 2 panel reports, and 1 invited lecture were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on attacks and counter measures, protocols, theory, hardware, chips and tags, signatures and encryption, as well as anonymity and e-cash.
(source: Nielsen Book Data)
- FC (Conference) (11th : 2007 : Scarborough, Trinidad and Tobago)
- Berlin : Springer, c2007.
- Description
- Book — xii, 390 p. : ill. ; 24 cm.
- Summary
-
- Keynote Address.- Leaving Room for the Bad Guys.- Payment Systems.- Vulnerabilities in First-Generation RFID-enabled Credit Cards.- Conditional E-Cash.- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.- Panel.- Panel: RFID Security and Privacy.- Position Statement in RFID S&P Panel: RFID and the Middleman.- Position Statement in RFID S&P Panel: Contactless Smart Cards.- Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure.- Anonymity.- A Model of Onion Routing with Provable Anonymity.- K-Anonymous Multi-party Secret Handshakes.- Authentication.- Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups.- On Authentication with HMAC and Non-random Properties.- Anonymity and Privacy.- Hidden Identity-Based Signatures.- Space-Efficient Private Search with Applications to Rateless Codes.- Cryptography and Commercial Transactions.- Cryptographic Securities Exchanges.- Improved Multi-party Contract Signing.- Informant: Detecting Sybils Using Incentives.- Financial Transactions and Web Services.- Dynamic Virtual Credit Card Numbers.- The Unbearable Lightness of PIN Cracking.- Panel.- Virtual Economies: Threats and Risks.- Invited Talk.- Usable SPACE: Security, Privacy, and Context for the Mobile User.- System Presentation.- Personal Digital Rights Management for Mobile Cellular Devices.- Cryptography.- Certificate Revocation Using Fine Grained Certificate Space Partitioning.- An Efficient Aggregate Shuffle Argument Scheme.- Usable Security Workshop.- Preface.- Full Papers.- An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.- WSKE: Web Server Key Enabled Cookies.- Usability Analysis of Secure Pairing Methods.- Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.- Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers.- Short Papers.- What Instills Trust? A Qualitative Study of Phishing.- Phishing IQ Tests Measure Fear, Not Ability.- Mental Models of Security Risks.- Improving Usability by Adding Security to Video Conferencing Systems.- A Sense of Security in Pervasive Computing-Is the Light on When the Refrigerator Door Is Closed?.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- FC 2007 (2007 : Scarborough, Trinidad and Tobago)
- Berlin : Springer, 2007.
- Description
- Book — xii, 390 p. : ill.
- Summary
-
- Keynote Address.- Leaving Room for the Bad Guys.- Payment Systems.- Vulnerabilities in First-Generation RFID-enabled Credit Cards.- Conditional E-Cash.- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.- Panel.- Panel: RFID Security and Privacy.- Position Statement in RFID S&P Panel: RFID and the Middleman.- Position Statement in RFID S&P Panel: Contactless Smart Cards.- Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure.- Anonymity.- A Model of Onion Routing with Provable Anonymity.- K-Anonymous Multi-party Secret Handshakes.- Authentication.- Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups.- On Authentication with HMAC and Non-random Properties.- Anonymity and Privacy.- Hidden Identity-Based Signatures.- Space-Efficient Private Search with Applications to Rateless Codes.- Cryptography and Commercial Transactions.- Cryptographic Securities Exchanges.- Improved Multi-party Contract Signing.- Informant: Detecting Sybils Using Incentives.- Financial Transactions and Web Services.- Dynamic Virtual Credit Card Numbers.- The Unbearable Lightness of PIN Cracking.- Panel.- Virtual Economies: Threats and Risks.- Invited Talk.- Usable SPACE: Security, Privacy, and Context for the Mobile User.- System Presentation.- Personal Digital Rights Management for Mobile Cellular Devices.- Cryptography.- Certificate Revocation Using Fine Grained Certificate Space Partitioning.- An Efficient Aggregate Shuffle Argument Scheme.- Usable Security Workshop.- Preface.- Full Papers.- An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.- WSKE: Web Server Key Enabled Cookies.- Usability Analysis of Secure Pairing Methods.- Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.- Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers.- Short Papers.- What Instills Trust? A Qualitative Study of Phishing.- Phishing IQ Tests Measure Fear, Not Ability.- Mental Models of Security Risks.- Improving Usability by Adding Security to Video Conferencing Systems.- A Sense of Security in Pervasive Computing-Is the Light on When the Refrigerator Door Is Closed?.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- FC 2006 (2006 : Anguilla)
- Berlin : Springer, 2006.
- Description
- Book — xi, 325 p. : ill.
- FC (Conference) (21st : 2017 : Sliema, Malta)
- Cham : Springer, 2017.
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Privacy and Identity Management.- Privacy and Data Processing.- Cryptographic Primitives and API's.-Vulnerabilities and Exploits.- Blockchain Technology.- Security of Internet Protocols.- Blind signatures.-Searching and Processing Private Data.- Secure Channel Protocols.- Privacy in Data Storage and Retrieval.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- FC (Conference) (19th : 2015 : San Juan, P.R.)
- Heidelberg : Springer, 2015.
- Description
- Book — 1 online resource (xiv, 574 pages) : illustrations
- Summary
-
- Sidechannels
- Cryptography in the cloud
- Payment and fraud detection
- Authentication and access control
- Cryptographic primitives
- Mobile security; privacy and incentives
- Applications and attacks
- Authenticated data structures.
- FC (Conference) (11th : 2007 : Scarborough, Trinidad and Tobago)
- Berlin ; New York : Springer, ©2007.
- Description
- Book — 1 online resource (xii, 390 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Keynote Address.- Leaving Room for the Bad Guys.- Payment Systems.- Vulnerabilities in First-Generation RFID-enabled Credit Cards.- Conditional E-Cash.- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.- Panel.- Panel: RFID Security and Privacy.- Position Statement in RFID S&P Panel: RFID and the Middleman.- Position Statement in RFID S&P Panel: Contactless Smart Cards.- Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure.- Anonymity.- A Model of Onion Routing with Provable Anonymity.- K-Anonymous Multi-party Secret Handshakes.- Authentication.- Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups.- On Authentication with HMAC and Non-random Properties.- Anonymity and Privacy.- Hidden Identity-Based Signatures.- Space-Efficient Private Search with Applications to Rateless Codes.- Cryptography and Commercial Transactions.- Cryptographic Securities Exchanges.- Improved Multi-party Contract Signing.- Informant: Detecting Sybils Using Incentives.- Financial Transactions and Web Services.- Dynamic Virtual Credit Card Numbers.- The Unbearable Lightness of PIN Cracking.- Panel.- Virtual Economies: Threats and Risks.- Invited Talk.- Usable SPACE: Security, Privacy, and Context for the Mobile User.- System Presentation.- Personal Digital Rights Management for Mobile Cellular Devices.- Cryptography.- Certificate Revocation Using Fine Grained Certificate Space Partitioning.- An Efficient Aggregate Shuffle Argument Scheme.- Usable Security Workshop.- Preface.- Full Papers.- An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.- WSKE: Web Server Key Enabled Cookies.- Usability Analysis of Secure Pairing Methods.- Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.- Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers.- Short Papers.- What Instills Trust? A Qualitative Study of Phishing.- Phishing IQ Tests Measure Fear, Not Ability.- Mental Models of Security Risks.- Improving Usability by Adding Security to Video Conferencing Systems.- A Sense of Security in Pervasive Computing-Is the Light on When the Refrigerator Door Is Closed?.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.