04790nam 22008295 450 99646569570331620200629115223.03-540-45126-910.1007/978-3-540-45126-6(CKB)1000000000212093(SSID)ssj0000323142(PQKBManifestationID)11243640(PQKBTitleCode)TC0000323142(PQKBWorkID)10296593(PQKB)10231466(DE-He213)978-3-540-45126-6(MiAaPQ)EBC6302130(MiAaPQ)EBC5585092(Au-PeEL)EBL5585092(OCoLC)166468557(PPN)155200011(EXLCZ)99100000000021209320131114d2003 u| 0engurnn|008mamaatxtccrFinancial Cryptography[electronic resource] 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers /edited by Rebecca N. Wright1st ed. 2003.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2003.1 online resource (VIII, 328 p.) Lecture Notes in Computer Science,0302-9743 ;2742Bibliographic Level Mode of Issuance: Monograph3-540-40663-8 Includes bibliographical references and index.Micropayment and E-cash -- Using Trust Management to Support Transferable Hash-Based Micropayments -- A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks -- On the Anonymity of Fair Offline E-cash Systems -- Retrofitting Fairness on the Original RSA-Based E-cash -- Panel: Does Anyone Really Need MicroPayments? -- Does Anyone Really Need MicroPayments? -- The Case Against Micropayments -- Security, Anonymity, and Privacy -- On the Economics of Anonymity -- Squealing Euros: Privacy Protection in RFID-Enabled Banknotes -- How Much Security Is Enough to Stop a Thief? -- Attacks -- Cryptanalysis of the OTM Signature Scheme from FC’02 -- “Man in the Middle” Attacks on Bluetooth -- Fault Based Cryptanalysis of the Advanced Encryption Standard (AES) -- Panel: Economics of Security -- Economics, Psychology, and Sociology of Security -- Fair Exchange -- Timed Fair Exchange of Standard Signatures -- Asynchronous Optimistic Fair Exchange Based on Revocable Items -- Auctions -- Fully Private Auctions in a Constant Number of Rounds -- Secure Generalized Vickrey Auction Using Homomorphic Encryption -- Panel: Trusted Computing Platforms -- Trusted Computing Platforms: The Good, the Bad, and the Ugly -- On TCPA -- Cryptographic Tools and Primitives -- On The Computation-Storage Trade-Offs of Hash Chain Traversal -- Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures -- Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.Lecture Notes in Computer Science,0302-9743 ;2742FinanceData encryption (Computer science)Computer communication systemsOperating systems (Computers)AlgorithmsComputers and civilizationFinance, generalhttps://scigraph.springernature.com/ontologies/product-market-codes/600000Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Finance.Data encryption (Computer science).Computer communication systems.Operating systems (Computers).Algorithms.Computers and civilization.Finance, general.Cryptology.Computer Communication Networks.Operating Systems.Algorithm Analysis and Problem Complexity.Computers and Society.332.178Wright Rebecca Nedthttp://id.loc.gov/vocabulary/relators/edtFC 2003MiAaPQMiAaPQMiAaPQBOOK996465695703316Financial Cryptography772724UNISA