Financial Cryptography and Data Security
- Length: 650 pages
- Edition: 1st ed. 2017
- Language: English
- Publisher: Springer
- Publication Date: 2018-01-27
- ISBN-10: 3319709712
- ISBN-13: 9783319709710
- Sales Rank: #8097641 (See Top 100 Books)
Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers (Lecture Notes in Computer Science)
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017.
The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API’s; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval.
Table of Contents
Chapter 1. An Efficient Self-blindable Attribute-Based Credential Scheme
Chapter 2. Real Hidden Identity-Based Signatures
Chapter 3. BehavioCog: An Observation Resistant Authentication Scheme
Chapter 4. Updatable Tokenization: Formal Definitions and Provably Secure Constructions
Chapter 5. SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates
Chapter 6. Outsourcing Medical Dataset Analysis: A Possible Solution
Chapter 7. Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
Chapter 8. A Provably Secure PKCS#11 Configuration Without Authenticated Attributes
Chapter 9. A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
Chapter 10. Optimally Sound Sigma Protocols Under DCRA
Chapter 11. Economically Optimal Variable Tag Length Message Authentication
Chapter 12. PEEP: Passively Eavesdropping Private Input via Brainwave Signals
Chapter 13. Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript
Chapter 14. Attacks on Secure Logging Schemes
Chapter 15. Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS
Chapter 16. Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store
Chapter 17. Short Paper: Addressing Sophisticated Email Attacks
Chapter 18. Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin
Chapter 19. Trust Is Risk: A Decentralized Financial Trust Platform
Chapter 20. A Smart Contract for Boardroom Voting with Maximum Voter Privacy
Chapter 21. Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies
Chapter 22. Short Paper: Service-Oriented Sharding for Blockchains
Chapter 23. The Security of NTP’s Datagram Protocol
Chapter 24. Short Paper: On Deployment of DNS-Based Security Enhancements
Chapter 25. A Practical Multivariate Blind Signature Scheme
Chapter 26. Efficient Round-Optimal Blind Signatures in the Standard Model
Chapter 27. Secure Multiparty Computation from SGX
Chapter 28. Efficient No-dictionary Verifiable Searchable Symmetric Encryption
Chapter 29. Faster Homomorphic Evaluation of Discrete Fourier Transforms
Chapter 30. Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers
Chapter 31. Unilaterally-Authenticated Key Exchange
Chapter 32. Formal Modeling and Verification for Domain Validation and ACME
Chapter 33. Why Banker Bob (Still) Can’t Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps
Chapter 34. Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage
Chapter 35. A Simpler Rate-Optimal CPIR Protocol
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.