Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers

Front Cover
Radu Sion
Springer Science & Business Media, Jul 15, 2010 - Computers - 432 pages
0 Reviews
This volume contains the main proceedings of the 14th Financial Cryptograpy and Data Security International Conference 2010, held in Tenerife, Canary - lands, Spain, January 25 28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original works focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Despite the dire economic climate as well as strong competition from other top-tier related security conferences, the ProgramCommittee received 130 hi- quality submissions and accepted 19 full-length papers (14.6% acceptance rate), 15 short papers (26.1% acceptance rate), 7 posters and 1 panel. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS), theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimateandcolorfulbytradition, thehigh-qualityprogramwasnottheonly attraction of FC. In the past, FC conferences have been held in highly resear- synergisticlocationssuchasTobago, Anguilla, Dominica, KeyWest, Guadelupe, Bermuda, the GrandCayman, and CozumelMexico.2010wasthe?rst yearthat the conference was held on European soil, on the Spanish Canary Islands, in Atlantic waters, a few miles across from Morocco. Over 100 researchers from more than 20 countries were in attend
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Constructive Cryptography A Primer
1
Security Mechanisms with Selfish Players in Wireless Networks
2
True Stories from the CyLab Usable Privacy and Security Laboratory
3
Multichannel Protocols to Prevent Relay Attacks
4
A Traceability Attack against ePassports
20
Secure Computation with FixedPoint Numbers
35
Implementing a HighAssurance SmartCard OS
51
Unlinkable Priced Oblivious Transfer with Rechargeable Wallets
66
A Voting Machine with a Tiny TCB Short Paper
312
Attacking of SmartCardBased Banking Applications with JavaScriptBased Rootkits Short Paper
320
Security Applications of Diodes with Unique CurrentVoltage Characteristics Short Paper
328
Or How Not to Design Authentication Short Paper
336
All You Can Eat or Breaking a RealWorld Contactless Payment System Short Paper
343
ShoulderSurfing Safe Login in a Partially Observable Attacker Model Short Paper
351
Using Sphinx to Improve Onion Routing Circuit Construction Extended Abstract
359
Secure Multiparty AES Short Paper
367

Multiple Denominations in Ecash with Compact Transaction Data
82
Whats in a Name? Evaluating Statistical Attacks on Personal Knowledge Questions
98
Cryptographic Protocol Analysis of ANON
114
A CDHBased Ring Signature Scheme with Short Signatures and Public Keys
129
Practical Private Set Intersection Protocols with Linear Complexity
143
Design and Implementation of a KeyLifecycle Management System
160
Measuring the Perpetrators and Funders of Typosquatting
175
A LearningBased Approach to Reactive Security
192
Offloading Server and NetworkUsing Hardware Tokens
207
Securely Sharing Attack Data between Competitors
222
Building Incentives into Tor
238
TreeHomomorphic Encryption and Scalable Hierarchical SecretBallot Elections
257
Automatically Preparing Safe SQL Queries
272
New Collision Attacks against the Global X509 Infrastructure
289
ThreeRound AbuseFree Optimistic Contract Signing with Everlasting Secrecy Extended Abstract
304
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis Extended Abstract
375
On Robust Key Agreement Based on Public Key Authentication Short Paper
383
A Formal Approach for Automated Reasoning about OffLine and Undetectable OnLine Guessing Short Paper
391
Signatures of Reputation Extended Abstract
400
IntentionDisguised Algorithmic Trading Short Paper
408
When Information Improves Information Security Short Paper
416
Empowering Users to Fight Phishing Poster
424
Certification Intermediaries and the Alternative Poster
425
An Authentication Service Taking Advantage of ZeroKnowledge Proofs
426
Security in Commercial Applications of Vehicular AdHoc Networks
427
Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols Poster
428
LowCost eBanking Secure against Untrusted Computers
429
Author Index
430
Copyright

Common terms and phrases

Bibliographic information