Financial Cryptography and Data Security: 11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers: Lecture Notes in Computer Science, cartea 4886
Editat de Sven Dietrich, Rachna Dhamijaen Limba Engleză Paperback – 18 dec 2007
Din seria Lecture Notes in Computer Science
- 20% Preț: 1040.03 lei
- 20% Preț: 333.46 lei
- 20% Preț: 335.08 lei
- 20% Preț: 444.17 lei
- 20% Preț: 238.01 lei
- 20% Preț: 333.46 lei
- 20% Preț: 438.69 lei
- Preț: 440.52 lei
- 20% Preț: 336.71 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 632.22 lei
- 17% Preț: 427.22 lei
- 20% Preț: 641.78 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1053.45 lei
- 20% Preț: 579.56 lei
- Preț: 373.56 lei
- 20% Preț: 330.23 lei
- 15% Preț: 429.74 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1386.07 lei
- 20% Preț: 1003.66 lei
- 20% Preț: 567.60 lei
- 20% Preț: 575.48 lei
- 20% Preț: 571.63 lei
- 20% Preț: 747.79 lei
- 15% Preț: 568.74 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 346.40 lei
- 20% Preț: 574.05 lei
- Preț: 402.62 lei
- 20% Preț: 584.40 lei
- 20% Preț: 747.79 lei
- 20% Preț: 809.19 lei
- 20% Preț: 649.49 lei
- 20% Preț: 343.16 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 387.70 lei
Nou
Puncte Express: 582
Preț estimativ în valută:
74.20€ • 77.07$ • 61.63£
74.20€ • 77.07$ • 61.63£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540773658
ISBN-10: 3540773657
Pagini: 406
Ilustrații: XIV, 394 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.59 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540773657
Pagini: 406
Ilustrații: XIV, 394 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.59 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Keynote Address.- Leaving Room for the Bad Guys.- Payment Systems.- Vulnerabilities in First-Generation RFID-enabled Credit Cards.- Conditional E-Cash.- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.- Panel.- Panel: RFID Security and Privacy.- Position Statement in RFID S&P Panel: RFID and the Middleman.- Position Statement in RFID S&P Panel: Contactless Smart Cards.- Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure.- Anonymity.- A Model of Onion Routing with Provable Anonymity.- K-Anonymous Multi-party Secret Handshakes.- Authentication.- Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer.- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups.- On Authentication with HMAC and Non-random Properties.- Anonymity and Privacy.- Hidden Identity-Based Signatures.- Space-Efficient Private Search with Applications to Rateless Codes.- Cryptography and Commercial Transactions.- Cryptographic Securities Exchanges.- Improved Multi-party Contract Signing.- Informant: Detecting Sybils Using Incentives.- Financial Transactions and Web Services.- Dynamic Virtual Credit Card Numbers.- The Unbearable Lightness of PIN Cracking.- Panel.- Virtual Economies: Threats and Risks.- Invited Talk.- Usable SPACE: Security, Privacy, and Context for the Mobile User.- System Presentation.- Personal Digital Rights Management for Mobile Cellular Devices.- Cryptography.- Certificate Revocation Using Fine Grained Certificate Space Partitioning.- An Efficient Aggregate Shuffle Argument Scheme.- Usable Security Workshop.- Preface.- Full Papers.- An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks.- WSKE: Web Server Key Enabled Cookies.- Usability Analysis ofSecure Pairing Methods.- Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.- Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers.- Short Papers.- What Instills Trust? A Qualitative Study of Phishing.- Phishing IQ Tests Measure Fear, Not Ability.- Mental Models of Security Risks.- Improving Usability by Adding Security to Video Conferencing Systems.- A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?.