| 000 | 08974cam a2201201 a 4500 | ||
|---|---|---|---|
| 001 | ocn233973745 | ||
| 003 | OCoLC | ||
| 005 | 20250703144347.0 | ||
| 006 | m o d | ||
| 007 | cr cn||||||||| | ||
| 008 | 080715s2007 gw a ob 101 0 eng d | ||
| 040 |
_aGW5XE _beng _epn _cGW5XE _dCOD _dSTF _dYNG _dNUI _dOCLCQ _dMND _dE7B _dUBC _dOCLCO _dOCLCQ _dOCLCA _dOCLCF _dBEDGE _dCOO _dOCLCO _dYDXCP _dOCLCQ _dOCLCO _dOCL _dOCLCO _dOCLCQ _dSHS _dESU _dOCLCQ _dU3W _dUAB _dOCLCQ _dTFW _dWYU _dICG _dOCLCQ _dOL$ _dOCLCQ _dAUD _dWURST _dW2U _dERF _dLUN _dOCLCQ _dSFB _dOCLCO _dOCLCA _dCOM _dOCLCO _dOCLCQ _dOCLCO _dOCLCL |
||
| 019 |
_a191046691 _a230744299 _a288296843 _a607322660 _a613676912 _a648366667 _a767235373 _a1086927552 _a1167332833 |
||
| 020 | _a9783540773665 | ||
| 020 | _a3540773665 | ||
| 020 |
_a9783540773658 _q(pbk.) |
||
| 020 |
_a3540773657 _q(pbk.) |
||
| 024 | 7 |
_a10.1007/978-3-540-77366-5 _2doi |
|
| 029 | 1 |
_aAU@ _b000048719522 |
|
| 029 | 1 |
_aAU@ _b000068694251 |
|
| 029 | 1 |
_aAU@ _b000068801737 |
|
| 029 | 1 |
_aNZ1 _b11642029 |
|
| 029 | 1 |
_aNZ1 _b13997176 |
|
| 035 |
_a(OCoLC)233973745 _z(OCoLC)191046691 _z(OCoLC)230744299 _z(OCoLC)288296843 _z(OCoLC)607322660 _z(OCoLC)613676912 _z(OCoLC)648366667 _z(OCoLC)767235373 _z(OCoLC)1086927552 _z(OCoLC)1167332833 |
||
| 037 |
_a978-3-540-77365-8 _bSpringer _nhttp://www.springerlink.com |
||
| 050 | 4 |
_aHG1710 _b.F35 2007eb |
|
| 072 | 7 |
_aHG _2lcco |
|
| 072 | 7 |
_aURY _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a332.1028 _222 |
| 084 |
_aSS 4800 _2rvk |
||
| 084 |
_a004 _2sdnb |
||
| 084 |
_aDAT 465f _2stub |
||
| 049 | _aMAIN | ||
| 111 | 2 |
_aFC (Conference) _n(11th : _d2007 : _cScarborough, Trinidad and Tobago) _925131 |
|
| 245 | 1 | 0 |
_aFinancial cryptography and data security : _b11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers / _cSven Dietrich, Rachna Dhamija (eds.). |
| 246 | 3 | 0 | _aFC 2007 |
| 246 | 3 | 0 | _a1st International Workshop on Usable Security |
| 246 | 3 | _aFirst International Workshop on Usable Security | |
| 246 | 3 | 0 | _aInternational Workshop on Usable Security |
| 246 | 3 | 0 | _aUSEC 2007 |
| 260 |
_aBerlin ; _aNew York : _bSpringer, _c©2007. |
||
| 300 |
_a1 online resource (xii, 390 pages) : _billustrations |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 | _atext file | ||
| 347 | _bPDF | ||
| 490 | 1 |
_aLecture notes in computer science, _x0302-9743 ; _v4886 |
|
| 490 | 1 | _aLNCS sublibrary. SL 4, Security and cryptology | |
| 504 | _aIncludes bibliographical references and index. | ||
| 588 | 0 | _aPrint version record. | |
| 505 | 0 | _aKeynote Address -- Leaving Room for the Bad Guys -- Payment Systems -- Vulnerabilities in First-Generation RFID-enabled Credit Cards -- Conditional E-Cash -- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting -- Panel -- Panel: RFID Security and Privacy -- Position Statement in RFID S & P Panel: RFID and the Middleman -- Position Statement in RFID S & P Panel: Contactless Smart Cards -- Position Statement in RFID S & P Panel: From Relative Security to Perceived Secure -- Anonymity -- A Model of Onion Routing with Provable Anonymity -- K-Anonymous Multi-party Secret Handshakes -- Authentication -- Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer -- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups -- On Authentication with HMAC and Non-random Properties -- Anonymity and Privacy -- Hidden Identity-Based Signatures -- Space-Efficient Private Search with Applications to Rateless Codes -- Cryptography and Commercial Transactions -- Cryptographic Securities Exchanges -- Improved Multi-party Contract Signing -- Informant: Detecting Sybils Using Incentives -- Financial Transactions and Web Services -- Dynamic Virtual Credit Card Numbers -- The Unbearable Lightness of PIN Cracking -- Panel -- Virtual Economies: Threats and Risks -- Invited Talk -- Usable SPACE: Security, Privacy, and Context for the Mobile User -- System Presentation -- Personal Digital Rights Management for Mobile Cellular Devices -- Cryptography -- Certificate Revocation Using Fine Grained Certificate Space Partitioning -- An Efficient Aggregate Shuffle Argument Scheme -- Usable Security Workshop -- Preface -- Full Papers -- An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks -- WSKE: Web Server Key Enabled Cookies -- Usability Analysis of Secure Pairing Methods -- Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup -- Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers -- Short Papers -- What Instills Trust? A Qualitative Study of Phishing -- Phishing IQ Tests Measure Fear, Not Ability -- Mental Models of Security Risks -- Improving Usability by Adding Security to Video Conferencing Systems -- A Sense of Security in Pervasive Computing--Is the Light on When the Refrigerator Door Is Closed? | |
| 520 | _aThis book constitutes the thoroughly refereed proceedings of the 11th International Conference on Financial Cryptography and Data Security, FC 2007, and the co-located 1st International Workshop on Usable Security, USEC 2007, both held in Scarborough, Trinidad/Tobago, in February 2007. The book includes 17 revised full papers, 1 system presentation paper and the transcriptions of 5 panel sessions from FC 2007. The papers, which were carefully reviewed and selected from 85 submissions, are organized in topical sections on Payment Systems, Anonymity, Authentication, Anonymity and Privacy, Cryptography and Commercial Transactions, Financial Transactions and Web Services, and Cryptography. The book concludes with 5 revised full and 5 revised short papers from the USEC 2007 workshop. This workshop brought together an interdisciplinary group of researchers and practitioners to discuss usability problems and deepen the understanding of users' capabilities and motivations in performing security tasks. | ||
| 650 | 0 |
_aElectronic funds transfers _xSecurity measures _vCongresses. _916506 |
|
| 650 | 0 |
_aData encryption (Computer science) _vCongresses. _915030 |
|
| 650 | 0 |
_aElectronic commerce _xSecurity measures _vCongresses. _916507 |
|
| 650 | 0 |
_aComputer networks _xSecurity measures _vCongresses. _915567 |
|
| 650 | 0 |
_aInternet _xSecurity measures _vCongresses. _916508 |
|
| 650 | 6 |
_aMonnaie électronique _xSécurité _xMesures _vCongrès. _916509 |
|
| 650 | 6 |
_aChiffrement (Informatique) _vCongrès. _916510 |
|
| 650 | 6 |
_aCommerce électronique _xSécurité _xMesures _vCongrès. _916511 |
|
| 650 | 6 |
_aRéseaux d'ordinateurs _xSécurité _xMesures _vCongrès. _916513 |
|
| 650 | 6 |
_aInternet _xSécurité _xMesures _vCongrès. _916512 |
|
| 650 | 7 |
_aInformatique. _2eclas _914930 |
|
| 650 | 7 |
_aComputer networks _xSecurity measures _2fast |
|
| 650 | 7 |
_aData encryption (Computer science) _2fast _913647 |
|
| 650 | 7 |
_aElectronic commerce _xSecurity measures _2fast _915715 |
|
| 650 | 7 |
_aElectronic funds transfers _xSecurity measures _2fast _916515 |
|
| 650 | 7 |
_aInternet _xSecurity measures _2fast _916516 |
|
| 653 | 0 | 0 | _aalgoritmen |
| 653 | 0 | 0 | _aalgorithms |
| 653 | 0 | 0 | _acomputeranalyse |
| 653 | 0 | 0 | _acomputer analysis |
| 653 | 0 | 0 | _acomputers |
| 653 | 0 | 0 | _asamenleving |
| 653 | 0 | 0 | _asociety |
| 653 | 0 | 0 | _ainformatiesystemen |
| 653 | 0 | 0 | _ainformation systems |
| 653 | 0 | 0 | _acomputerwetenschappen |
| 653 | 0 | 0 | _acomputer sciences |
| 653 | 0 | 0 | _acomputernetwerken |
| 653 | 0 | 0 | _acomputer networks |
| 653 | 0 | 0 | _agegevensbeheer |
| 653 | 0 | 0 | _adata management |
| 653 | 1 | 0 | _aInformation and Communication Technology (General) |
| 653 | 1 | 0 | _aInformatie- en communicatietechnologie (algemeen) |
| 655 | 2 |
_aCongress _911670 |
|
| 655 | 7 |
_aproceedings (reports) _2aat |
|
| 655 | 7 |
_aConference papers and proceedings _2fast _96065 |
|
| 655 | 7 |
_aConference papers and proceedings. _2lcgft _96065 |
|
| 655 | 7 |
_aActes de congrès. _2rvmgf _9609890 |
|
| 700 | 1 |
_aDietrich, Sven. _925133 |
|
| 700 | 1 |
_aDhamija, Rachna. _925134 |
|
| 711 | 2 |
_aInternational Workshop on Usable Security _n(1st : _d2007 : _cScarborough, Trinidad and Tobago) _925135 |
|
| 758 |
_ihas work: _aFinancial cryptography and data security (Text) _1https://id.oclc.org/worldcat/entity/E39PCFBV4Y7R74t4DKrPggdrmb _4https://id.oclc.org/worldcat/ontology/hasWork |
||
| 776 | 0 | 8 |
_iPrint version: _aFC 2007 (2007 : Scarborough, Trinidad and Tobago). _tFinancial cryptography and data security. _dBerlin ; New York : Springer, ©2007 _z9783540773658 _z3540773657 _w(DLC) 2007941592 _w(OCoLC)190795618 |
| 830 | 0 |
_aLecture notes in computer science ; _v4886. _x0302-9743 |
|
| 830 | 0 |
_aLNCS sublibrary. _nSL 4, _pSecurity and cryptology. _920708 |
|
| 856 | 4 | 0 | _uhttps://link.springer.com/10.1007/978-3-540-77366-5 |
| 938 |
_aYBP Library Services _bYANK _n2809938 |
||
| 994 |
_a92 _bATIST |
||
| 999 |
_c636991 _d636991 |
||