did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540282242

Trust, Privacy, and Security in Digital Business : Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings

by ; ;
  • ISBN13:

    9783540282242

  • ISBN10:

    3540282246

  • Format: Paperback
  • Copyright: 2005-10-16
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00 Save up to $80.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the Second International Conference on Trust and Privacy in Digital Business, TrustBus 2005, held in Copenhagen, Denmark, in August 2005. The 32 revised full papers presented together with an invited paper were carefully reviewed and selected from more than 100 submissions. The papers are organized in topical sections on digital business, mobile/wireless services, certificate revocation/index search, trust, digital signature, privacy, e-auctions, and smart cards/authentication.

Table of Contents

Invited Talk
Privacy Enhanced Technologies: Methods -- Markets -- Misuse
1(9)
Hannes Federrath
Digital Business
Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous Domains
10(10)
Petros Belsis
Stefanos Gritzalis
Apostolos Malatras
Christos Skourlas
Ioannis Chalaris
Protection Mechanisms Against Phishing Attacks
20(10)
Klaus Plossl
Hannes Federrath
Thomas Nowey
Dropout-Tolerant TTP-Free Mental Poker
30(11)
Jordi Castella-Roca
Francesc Sebe
Josep Domingo-Ferrer
A Self-healing Mechanism for an Intrusion Tolerance System
41(9)
Bumjoo Park
Kiejin Park
Sungsoo Kim
Protecting Online Rating Systems from Unfair Ratings
50(10)
Jianshu Weng
Chunyan Miao
Angela Goh
Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTP
60(10)
M. Magdalena Payeras-Capella
Josep Lluis Ferrer-Gomila
Llorenc Huguet-Rotger
Designing Secure E-Tendering Systems
70(10)
Rong Du
Ernest Foo
Juan Gonzalez Nieto
Colin Boyd
Mobile/Wireless Services
A Multilateral Secure Payment System for Wireless LAN Hotspots
80(10)
Stephan Groß
Sabine Lein
Sandra Steinbrecher
Secure Group Communications over Combined Wired and Wireless Networks
90(10)
Junghyun Nam
Seungjoo Kim
Dongho Won
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
100(10)
Oliver Jorns
Oliver Jung
Julia Gross
Sandford Bessler
Making Money with Mobile Qualified Electronic Signatures
110(9)
Heiko Rossnagel
Denis Royer
Certificate Revocation/Index Search
Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT)
119(9)
Jose L. Munoz
Jordi Forne
Oscar Esparza
Manel Rey
Secure Index Search for Groups
128(13)
Hyun- A Park
Jin Wook Byun
Dong Hoon Lee
Trust
Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations
141(10)
Nikolaos Oikonomidis
Sergiu Tcaciuc
Christoph Ruland
Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security
151(10)
Ching Lin
Vijay Varadharajan
Yan Wang
The Fuzzy and Dynamic Nature of Trust
161(14)
Elizabeth Chang
Patricia Thomson
Tharam Dillon
Farookh Hussain
Towards an Ontology of Trust
175(10)
Lea Viljanen
Digital Signature
An Improved Group Signature Scheme
185(10)
Jianhong Zhang
Jiancheng Zou
Yumin Wang
Efficient Member Revocation in Group Signature Schemes
195(11)
Eun Young Choi
Hyun-Jeong Kim
Dong Hoon Lee
Conditional Digital Signatures
206(10)
Marek Klonowski
Miroslaw Kutylowski
Anna Lauks
Filip Zagorski
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions
216(10)
Seung-Hyun Seo
Kyung-Ah Shim
Sang-Ho Lee
Privacy
Privacy Enforcement for IT Governance in Enterprises: Doing It for Real
226(10)
Marco Casassa Mont
Robert Thyne
Pete Bramhall
An Adaptive Privacy Management System for Data Repositories
236(10)
Marco Casassa Mont
Siani Pearson
Privacy Preserving Data Mining Services on the Web
246(10)
Ayca Azgin Hintoglu
Yucel Saygin
Salima Benbernou
Mohand Said Hacid
Reading Your Keystroke: Whose Mail Is It?
256(10)
Sylvia Mercado Kierkegaard
E-Auctions
A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem
266(8)
Huafei Zhu
Feng Bao
An Improved Double Auction Protocol Against False Bids
274(14)
Jung Hoon Ha
Jianying Zhou
SangJae Moon
An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-Auctions
288(11)
Glenn Bewsell
Rodger Jamieson
Adrian Gardiner
Deborah Bunker
Smart Cards/Authentication
A Secure Fingerprint Authentication System on an Untrusted Computing Environment
299(12)
Yongwha Chung
Daesung Moon
Taehae Kim
SungBum Pan
Security Enhancement for Password Authentication Schemes with Smart Cards
311(10)
Eun-Jun Yoon
Woo-Hun Kim
Kee- Young Yoo
Securing Operating System Services Based on Smart Cards
321(10)
Luigi Catuogno
Roberto Gassira
Michele Masullo
Ivan Visconti
Author Index 331

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program