TY - BOOK AU - Di Crescenzo,Giovanni AU - Rubin,Aviel D. ED - FC (Conference) TI - Financial cryptography and data security: 10th international conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006 : revised selected papers T2 - Lecture notes in computer science, SN - 9783540462569 AV - HG1710 .F35 2006eb U1 - 332.1028 22 PY - 2006/// CY - Berlin, New York PB - Springer KW - Electronic funds transfers KW - Security measures KW - Congresses KW - Data encryption (Computer science) KW - Electronic commerce KW - Computer networks KW - Internet KW - Monnaie électronique KW - Sécurité KW - Mesures KW - Congrès KW - Chiffrement (Informatique) KW - Commerce électronique KW - Réseaux d'ordinateurs KW - Informatique KW - eclas KW - fast KW - algoritmen KW - algorithms KW - computeranalyse KW - computer analysis KW - computers KW - samenleving KW - society KW - informatiesystemen KW - information systems KW - computerwetenschappen KW - computer sciences KW - computernetwerken KW - computer networks KW - gegevensbeheer KW - data management KW - operating systems KW - Information and Communication Technology (General) KW - Informatie- en communicatietechnologie (algemeen) KW - Congress KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - Includes bibliographical references and index; Authentication and Fraud Detection -- Phoolproof Phishing Prevention -- A Protocol for Secure Public Instant Messaging -- Using Automated Banking Certificates to Detect Unauthorised Financial Transactions -- Privacy -- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption -- A Private Stable Matching Algorithm -- Private Policy Negotiation -- Reputation and Mix-Nets -- Uncheatable Reputation for Distributed Computation Markets -- An Efficient Publicly Verifiable Mix-Net for Long Inputs -- Auditable Privacy: On Tamper-Evident Mix Networks -- Short Papers -- A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation -- Defeating Malicious Servers in a Blind Signatures Based Voting System -- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng -- Credit Transfer for Market-Based Infrastructure -- A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions -- Cryptanalysis of a Partially Blind Signature Scheme orHowtoMake$100Billswith$1and$2Ones -- Conditional Financial Cryptography -- A Generic Construction for Token-Controlled Public Key Encryption -- Timed-Release and Key-Insulated Public Key Encryption -- Conditional Encrypted Mapping and Comparing Encrypted Numbers -- Revisiting Oblivious Signature-Based Envelopes -- Payment Systems -- Provably Secure Electronic Cash Based on Blind Multisignature Schemes -- Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings -- Privacy-Protecting Coupon System Revisited -- Efficient Protocols -- Efficient Broadcast Encryption Scheme with Log-Key Storage -- Efficient Correlated Action Selection -- Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination; Available to OhioLINK libraries UR - https://link.springer.com/10.1007/11889663 ER -