金融密码术与数据安全:FC 2006/会议文选

金融密码术与数据安全:FC 2006/会议文选
作 者: Giovanni Di Crescenzo
出版社: 湖南文艺出版社
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《金融密码术与数据安全:FC 2006/会议文选》作者简介

内容简介

The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and Societies, LNCS has grown into the most comprehensive computer science research forum available.The scope of LNCS, including its sub series LNAI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes- Proceedings(published in time for the respective conference) - Post-proceedings(consisting of thoroughly revised final full papers) -research monographs(which may be based on outstanding PhD work, research projects, technical reports, etc.)

图书目录

Authentication and Fraud Detection

 Phoolproof Phishing Prevention

 A Protocol for Secure Public Instant Messaging

 Using Automated Banking Certificates to Detect Unauthorised Financial Transactions

Privacy

 Privacy in Encrypted Content Distribution Using Private Broadcast Encryption

A Private Stable Matching Algorithm

Private Policy Negotiation

Reputation and Mix-Nets

Uncheatable Reputation for Distributed Computation Markets

An Efficient Publicly Verifiable Mix-Net for Long Inputs

Auditable Privacy: On Tamper-Evident Mix Networks

Short Papers

A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation

Defeating Malicious Servers in a Blind Signatures Based Voting System

Pairing Based Threshold Cryptography hnproving on Libert-Quisquater and Baek-Zheng

Credit Transfer for Market-Based Infrastructure

A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions

Cryptanalysis of a Partially Blind Signature Scheme or How to Make

Conditional Financial Cryptography

A Generic Construction for Token-Controlled Public Key Encryption

Timed-Release and Key-Insulated Public Key Encryption

Conditional Encrypted Mapping and Comparing Encrypted Numbers

Revisiting Oblivious Signature-Based Envelopes

Payment Systems

Provably Secure Electronic Cash Based on Blind Multisignature Schemes

Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings

……

Efficient Protocols

Author Index