Financial Cryptography and Data Security 11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers

The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http://fc07. ifca. ai), organized by the International Financial Crypt- raphy Association (IFCA, http://www. ifca. ai/), was held in Tobago, February 12–15, 2007. The conference is a well-established and premier...

Full description

Bibliographic Details
Other Authors: Dietrich, Sven (Editor), Dhamija, Rachna (Editor)
Format: eBook
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2007, 2007
Edition:1st ed. 2007
Series:Security and Cryptology
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Cryptography and Commercial Transactions
  • Cryptographic Securities Exchanges
  • Improved Multi-party Contract Signing
  • Informant: Detecting Sybils Using Incentives
  • Financial Transactions and Web Services
  • Dynamic Virtual Credit Card Numbers
  • The Unbearable Lightness of PIN Cracking
  • Panel
  • Virtual Economies: Threats and Risks
  • Invited Talk
  • Usable SPACE: Security, Privacy, and Context for the Mobile User
  • System Presentation
  • Personal Digital Rights Management for Mobile Cellular Devices
  • Cryptography
  • Certificate Revocation Using Fine Grained Certificate Space Partitioning
  • An Efficient Aggregate Shuffle Argument Scheme
  • Usable Security Workshop
  • Preface
  • Full Papers
  • An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks
  • WSKE: Web Server Key Enabled Cookies
  • Usability Analysis ofSecure Pairing Methods
  • Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup
  • Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers
  • Short Papers
  • What Instills Trust? A Qualitative Study of Phishing
  • Phishing IQ Tests Measure Fear, Not Ability
  • Mental Models of Security Risks
  • Improving Usability by Adding Security to Video Conferencing Systems
  • A Sense of Security in Pervasive Computing—Is the Light on When the Refrigerator Door Is Closed?
  • Keynote Address
  • Leaving Room for the Bad Guys
  • Payment Systems
  • Vulnerabilities in First-Generation RFID-enabled Credit Cards
  • Conditional E-Cash
  • A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
  • Panel
  • Panel: RFID Security and Privacy
  • Position Statement in RFID S&P Panel: RFID and the Middleman
  • Position Statement in RFID S&P Panel: Contactless Smart Cards
  • Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure
  • Anonymity
  • A Model of Onion Routing with Provable Anonymity
  • K-Anonymous Multi-party Secret Handshakes
  • Authentication
  • Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
  • Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
  • On Authentication with HMAC and Non-random Properties
  • Anonymity and Privacy
  • Hidden Identity-Based Signatures
  • Space-Efficient Private Search with Applications to Rateless Codes