|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465992003316 |
|
|
Titolo |
Financial cryptography : 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001 : proceedings / / Paul F. Syverson (ed.) |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Germany ; ; New York, New York : , : Springer, , [2002] |
|
©2002 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2002.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (IX, 379 p.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 0302-9743 ; ; 2339 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Internet - Security measures |
Electronic funds transfers - Security measures |
Electronic commerce - Security measures |
Computer networks - Security measures |
Data encryption (Computer science) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Managing Payment Transaction Costs -- Amortized E-Cash -- Offline Micropayments without Trusted Hardware -- Panel (I) -- The Practical Problems of Implementing MicroMint -- Protecting Digital Rights -- Aspects of Digital Rights Management and the Use of Hardware Security Devices -- A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data -- Golden Times for Digital Rights Management? -- Applicability of Public Key Cryptosystems to Digital Rights Management Applications -- Trust and Risk Management -- On the Global Content PMI: Improved Copy-Protected Internet Content Distribution -- Trust: A Collision of Paradigms -- Groups and Anonymity -- On the Security of Homage Group Authentication Protocol -- Anonymity without ‘Cryptography’ -- Fair Tracing without Trustees -- Invited Talk -- Why the War on Money Laundering Should Be Aborted -- Certificates and Authentication -- Provably Secure Implicit Certificate Schemes -- Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation -- Mutual Authentication for Low-Power Mobile Devices -- Credit Card Security |
|
|
|
|
|
|
|
|
|
|
-- Off-Line Generation of Limited-Use Credit Card Numbers -- A Security Framework for Card-Based Systems -- SecureClick: A Web Payment System with Disposable Credit Card Numbers -- Panel (II) -- The Business of Electronic Voting -- Markets and Multiparty Computation -- Privacy for the Stock Market -- Secure Distributed Computing in a Commercial Environment -- Signatures in Financial Cryptography -- Monotone Signatures -- The Power of RSA Inversion Oracles and the Security of Chaum’s RSA-Based Blind Signature Scheme -- Optimistic Fair Exchange with Transparent Signature Recovery -- Auctions -- (M + 1)st-Price Auction Protocol -- Non-interactive Private Auctions. |
|
|
|
|
|
| |