000 08974cam a2201201 a 4500
001 ocn233973745
003 OCoLC
005 20250703144347.0
006 m o d
007 cr cn|||||||||
008 080715s2007 gw a ob 101 0 eng d
040 _aGW5XE
_beng
_epn
_cGW5XE
_dCOD
_dSTF
_dYNG
_dNUI
_dOCLCQ
_dMND
_dE7B
_dUBC
_dOCLCO
_dOCLCQ
_dOCLCA
_dOCLCF
_dBEDGE
_dCOO
_dOCLCO
_dYDXCP
_dOCLCQ
_dOCLCO
_dOCL
_dOCLCO
_dOCLCQ
_dSHS
_dESU
_dOCLCQ
_dU3W
_dUAB
_dOCLCQ
_dTFW
_dWYU
_dICG
_dOCLCQ
_dOL$
_dOCLCQ
_dAUD
_dWURST
_dW2U
_dERF
_dLUN
_dOCLCQ
_dSFB
_dOCLCO
_dOCLCA
_dCOM
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
019 _a191046691
_a230744299
_a288296843
_a607322660
_a613676912
_a648366667
_a767235373
_a1086927552
_a1167332833
020 _a9783540773665
020 _a3540773665
020 _a9783540773658
_q(pbk.)
020 _a3540773657
_q(pbk.)
024 7 _a10.1007/978-3-540-77366-5
_2doi
029 1 _aAU@
_b000048719522
029 1 _aAU@
_b000068694251
029 1 _aAU@
_b000068801737
029 1 _aNZ1
_b11642029
029 1 _aNZ1
_b13997176
035 _a(OCoLC)233973745
_z(OCoLC)191046691
_z(OCoLC)230744299
_z(OCoLC)288296843
_z(OCoLC)607322660
_z(OCoLC)613676912
_z(OCoLC)648366667
_z(OCoLC)767235373
_z(OCoLC)1086927552
_z(OCoLC)1167332833
037 _a978-3-540-77365-8
_bSpringer
_nhttp://www.springerlink.com
050 4 _aHG1710
_b.F35 2007eb
072 7 _aHG
_2lcco
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a332.1028
_222
084 _aSS 4800
_2rvk
084 _a004
_2sdnb
084 _aDAT 465f
_2stub
049 _aMAIN
111 2 _aFC (Conference)
_n(11th :
_d2007 :
_cScarborough, Trinidad and Tobago)
_925131
245 1 0 _aFinancial cryptography and data security :
_b11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers /
_cSven Dietrich, Rachna Dhamija (eds.).
246 3 0 _aFC 2007
246 3 0 _a1st International Workshop on Usable Security
246 3 _aFirst International Workshop on Usable Security
246 3 0 _aInternational Workshop on Usable Security
246 3 0 _aUSEC 2007
260 _aBerlin ;
_aNew York :
_bSpringer,
_c©2007.
300 _a1 online resource (xii, 390 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
347 _bPDF
490 1 _aLecture notes in computer science,
_x0302-9743 ;
_v4886
490 1 _aLNCS sublibrary. SL 4, Security and cryptology
504 _aIncludes bibliographical references and index.
588 0 _aPrint version record.
505 0 _aKeynote Address -- Leaving Room for the Bad Guys -- Payment Systems -- Vulnerabilities in First-Generation RFID-enabled Credit Cards -- Conditional E-Cash -- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting -- Panel -- Panel: RFID Security and Privacy -- Position Statement in RFID S & P Panel: RFID and the Middleman -- Position Statement in RFID S & P Panel: Contactless Smart Cards -- Position Statement in RFID S & P Panel: From Relative Security to Perceived Secure -- Anonymity -- A Model of Onion Routing with Provable Anonymity -- K-Anonymous Multi-party Secret Handshakes -- Authentication -- Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer -- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups -- On Authentication with HMAC and Non-random Properties -- Anonymity and Privacy -- Hidden Identity-Based Signatures -- Space-Efficient Private Search with Applications to Rateless Codes -- Cryptography and Commercial Transactions -- Cryptographic Securities Exchanges -- Improved Multi-party Contract Signing -- Informant: Detecting Sybils Using Incentives -- Financial Transactions and Web Services -- Dynamic Virtual Credit Card Numbers -- The Unbearable Lightness of PIN Cracking -- Panel -- Virtual Economies: Threats and Risks -- Invited Talk -- Usable SPACE: Security, Privacy, and Context for the Mobile User -- System Presentation -- Personal Digital Rights Management for Mobile Cellular Devices -- Cryptography -- Certificate Revocation Using Fine Grained Certificate Space Partitioning -- An Efficient Aggregate Shuffle Argument Scheme -- Usable Security Workshop -- Preface -- Full Papers -- An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks -- WSKE: Web Server Key Enabled Cookies -- Usability Analysis of Secure Pairing Methods -- Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup -- Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers -- Short Papers -- What Instills Trust? A Qualitative Study of Phishing -- Phishing IQ Tests Measure Fear, Not Ability -- Mental Models of Security Risks -- Improving Usability by Adding Security to Video Conferencing Systems -- A Sense of Security in Pervasive Computing--Is the Light on When the Refrigerator Door Is Closed?
520 _aThis book constitutes the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, FC 2007, and the co-located 1st International Workshop on Usable Security, USEC 2007, both held in Scarborough, Trinidad/Tobago, in February 2007. The book includes 17 revised full papers, 1 system presentation paper and the transcriptions of 5 panel sessions from FC 2007. The papers, which were carefully reviewed and selected from 85 submissions, are organized in topical sections on Payment Systems, Anonymity, Authentication, Anonymity and Privacy, Cryptography and Commercial Transactions, Financial Transactions and Web Services, and Cryptography. The book concludes with 5 revised full and 5 revised short papers from the USEC 2007 workshop. This workshop brought together an interdisciplinary group of researchers and practitioners to discuss usability problems and deepen the understanding of users' capabilities and motivations in performing security tasks.
650 0 _aElectronic funds transfers
_xSecurity measures
_vCongresses.
_916506
650 0 _aData encryption (Computer science)
_vCongresses.
_915030
650 0 _aElectronic commerce
_xSecurity measures
_vCongresses.
_916507
650 0 _aComputer networks
_xSecurity measures
_vCongresses.
_915567
650 0 _aInternet
_xSecurity measures
_vCongresses.
_916508
650 6 _aMonnaie électronique
_xSécurité
_xMesures
_vCongrès.
_916509
650 6 _aChiffrement (Informatique)
_vCongrès.
_916510
650 6 _aCommerce électronique
_xSécurité
_xMesures
_vCongrès.
_916511
650 6 _aRéseaux d'ordinateurs
_xSécurité
_xMesures
_vCongrès.
_916513
650 6 _aInternet
_xSécurité
_xMesures
_vCongrès.
_916512
650 7 _aInformatique.
_2eclas
_914930
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aData encryption (Computer science)
_2fast
_913647
650 7 _aElectronic commerce
_xSecurity measures
_2fast
_915715
650 7 _aElectronic funds transfers
_xSecurity measures
_2fast
_916515
650 7 _aInternet
_xSecurity measures
_2fast
_916516
653 0 0 _aalgoritmen
653 0 0 _aalgorithms
653 0 0 _acomputeranalyse
653 0 0 _acomputer analysis
653 0 0 _acomputers
653 0 0 _asamenleving
653 0 0 _asociety
653 0 0 _ainformatiesystemen
653 0 0 _ainformation systems
653 0 0 _acomputerwetenschappen
653 0 0 _acomputer sciences
653 0 0 _acomputernetwerken
653 0 0 _acomputer networks
653 0 0 _agegevensbeheer
653 0 0 _adata management
653 1 0 _aInformation and Communication Technology (General)
653 1 0 _aInformatie- en communicatietechnologie (algemeen)
655 2 _aCongress
_911670
655 7 _aproceedings (reports)
_2aat
655 7 _aConference papers and proceedings
_2fast
_96065
655 7 _aConference papers and proceedings.
_2lcgft
_96065
655 7 _aActes de congrès.
_2rvmgf
_9609890
700 1 _aDietrich, Sven.
_925133
700 1 _aDhamija, Rachna.
_925134
711 2 _aInternational Workshop on Usable Security
_n(1st :
_d2007 :
_cScarborough, Trinidad and Tobago)
_925135
758 _ihas work:
_aFinancial cryptography and data security (Text)
_1https://id.oclc.org/worldcat/entity/E39PCFBV4Y7R74t4DKrPggdrmb
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aFC 2007 (2007 : Scarborough, Trinidad and Tobago).
_tFinancial cryptography and data security.
_dBerlin ; New York : Springer, ©2007
_z9783540773658
_z3540773657
_w(DLC) 2007941592
_w(OCoLC)190795618
830 0 _aLecture notes in computer science ;
_v4886.
_x0302-9743
830 0 _aLNCS sublibrary.
_nSL 4,
_pSecurity and cryptology.
_920708
856 4 0 _uhttps://link.springer.com/10.1007/978-3-540-77366-5
938 _aYBP Library Services
_bYANK
_n2809938
994 _a92
_bATIST
999 _c636991
_d636991