TY - BOOK AU - Patrick,Andrew Scott AU - Yung,Moti ED - FC (Conference) TI - Financial cryptography and data security: 9th international conference, FC 2005, Roseau, the Commonwealth of Dominica, February 28-March 3, 2005 : revised papers T2 - Lecture notes in computer science, SN - 9783540316800 AV - HG1710 .F35 2005eb U1 - 005.8/2 22 PY - 2005/// CY - Berlin PB - Springer KW - Electronic funds transfers KW - Security measures KW - Congresses KW - Data encryption (Computer science) KW - Electronic commerce KW - Computer networks KW - Internet KW - Monnaie électronique KW - Sécurité KW - Mesures KW - Congrès KW - Chiffrement (Informatique) KW - Commerce électronique KW - Réseaux d'ordinateurs KW - COMPUTERS KW - Security KW - Cryptography KW - bisacsh KW - Informatique KW - eclas KW - fast KW - Mesures de sécurité KW - rasuqam KW - Cryptage KW - Réseau d'ordinateurs KW - Sécurité des données KW - Financial cryptography KW - Data security KW - FC KW - Congress KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - Includes bibliographical references and index; Threat and Attacks -- Fraud Within Asymmetric Multi-hop Cellular Networks -- Protecting Secret Data from Insider Attacks -- Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling -- Invited Speaker -- Trust and Swindling on the Internet -- Digital Signing Methods -- Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures) -- Time Capsule Signature -- Policy-Based Cryptography and Applications -- Panel -- A Chat at the Old Phishin' Hole -- Modeling and Preventing Phishing Attacks -- Helping the Phish Detect the Lure -- Who'd Phish from the Summit of Kilimanjaro? -- Privacy -- A Privacy-Protecting Coupon System -- Testing Disjointness of Private Datasets -- Hardware Oriented Mechanisms -- RFID Traceability: A Multilayer Problem -- Information-Theoretic Security Analysis of Physical Uncloneable Functions -- Supporting Financial Transactions -- Risk Assurance for Hedge Funds Using Zero Knowledge Proofs -- Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure -- Systems, Applications, and Experiences -- Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce -- Securing Sensitive Data with the Ingrian DataSecure Platform -- Ciphire Mail Email Encryption and Authentication -- Message Authentication -- A User-Friendly Approach to Human Authentication of Messages -- Approximate Message Authentication and Biometric Entity Authentication -- Exchanges and Contracts -- Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model -- Achieving Fairness in Private Contract Negotiation -- Auctions and Voting -- Small Coalitions Cannot Manipulate Voting -- Efficient Privacy-Preserving Protocols for Multi-unit Auctions -- Event Driven Private Counters -- Works in Progress -- Secure Distributed Human Computation -- Secure Multi-attribute Procurement Auction -- Audit File Reduction Using N-Gram Models -- User Authentication -- Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication -- Secure Biometric Authentication for Weak Computational Devices -- Panel Summary: Incentives, Markets and Information Security; Available to OhioLINK libraries N2 - "The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica from February 28 to March 3, 2005." UR - https://link.springer.com/10.1007/b137875 ER -