Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
55
views
0
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,425
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Financial Cryptography and Data Security
other
Editor(s):
Ahmad-Reza Sadeghi
Publication date
(Print):
2013
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Author and book information
Book
ISBN (Print):
978-3-642-39883-4
ISBN (Electronic):
978-3-642-39884-1
Publication date (Print):
2013
DOI:
10.1007/978-3-642-39884-1
SO-VID:
0688956d-194f-4863-9083-164bc87e388f
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Can Nature Help Us Solve Risk Management Issues?
pp. 6
Quantitative Analysis of the Full Bitcoin Transaction Graph
pp. 25
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk
pp. 34
Evaluating User Privacy in Bitcoin
pp. 52
The Importance of Being Earnest [In Security Warnings]
pp. 60
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing
pp. 69
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication
pp. 78
Practical Fully Simulatable Oblivious Transfer with Sublinear Communication
pp. 96
Unconditionally-Secure Robust Secret Sharing with Minimum Share Size
pp. 111
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data
pp. 126
“Give Me Letters 2, 3 and 6!”: Partial Password Implementations and Attacks
pp. 144
Hey, You, Get Off of My Clipboard
pp. 162
Unique Ring Signatures: A Practical Construction
pp. 171
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
pp. 189
Accumulators and U-Prove Revocation
pp. 197
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy
pp. 205
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems
pp. 213
Coupon Collector’s Problem for Fault Analysis against AES — High Tolerance for Noisy Fault Injections
pp. 221
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study
pp. 230
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards
pp. 239
Securely Solving Simple Combinatorial Graph Problems
pp. 258
Parallel and Dynamic Searchable Symmetric Encryption
pp. 275
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits
pp. 293
The Untapped Potential of Trusted Execution Environments on Mobile Devices
pp. 295
Stark
pp. 313
Risks of Offline Verify PIN on Contactless Cards
pp. 322
How to Attack Two-Factor Authentication Internet Banking
pp. 329
CAge: Taming Certificate Authorities by Inferring Restricted Scopes
pp. 338
Interdependent Privacy: Let Me Share Your Data
pp. 354
A Secure Submission System for Online Whistleblowing Platforms
pp. 362
Securing Anonymous Communication Channels under the Selective DoS Attack
pp. 371
PIRMAP: Efficient Private Information Retrieval for MapReduce
pp. 386
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates
pp. 395
Three-Factor User Authentication Method Using Biometrics Challenge Response
pp. 397
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services
pp. 399
Onions for Sale: Putting Privacy on the Market
pp. 401
Searchable Encryption Supporting General Boolean Expression Queries
pp. 402
A Privacy Preserving E-Payment Architecture
pp. 403
Communication Services Empowered with a Classical Chaos Based Cryptosystem
Similar content
3,425
Disorder generated by interacting neural networks: application to econophysics and cryptography
Authors:
Wolfgang Kinzel
,
Ido Kanter
Mathematical methods in solutions of the problems from the Third International Students' Olympiad in Cryptography
Authors:
G. Shushuev
,
N. Kolomeec
,
V. Idrisova
…
Optimal Multisecret Image Sharing Using Lightweight Visual Sign-Cryptography Scheme With Optimal Key Generation for Gray/Color Images
Authors:
Pramod M. Bachiphale
,
Nitish Zulpe
See all similar
Cited by
4
Priority Mechanism of Bitcoin and Its Effect on Transaction-Confirmation Process
Authors:
,
Strong Federations: An Interoperable Blockchain Solution to Centralized Third Party Risks
Authors:
Johnny Dilley
,
Andrew Poelstra
,
Jonathan Wilkins
…
Empirically Analyzing Ethereum's Gas Mechanism
Authors:
Renlord Yang
,
Toby Murray
,
Paul Rimba
…
See all cited by