LEADER 03455oam 2200565 450 001 996465516703316 005 20210715181258.0 010 $a3-540-48390-X 024 7 $a10.1007/3-540-48390-X 035 $a(CKB)1000000000211100 035 $a(SSID)ssj0000323145 035 $a(PQKBManifestationID)11243641 035 $a(PQKBTitleCode)TC0000323145 035 $a(PQKBWorkID)10296498 035 $a(PQKB)11421857 035 $a(DE-He213)978-3-540-48390-8 035 $a(MiAaPQ)EBC3072860 035 $a(MiAaPQ)EBC6486323 035 $a(PPN)155216147 035 $a(EXLCZ)991000000000211100 100 $a20210715d1999 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aFinancial cryptography $e4th International Conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000 : proceedings /$fMatthew Franklin, editor 205 $a1st ed. 1999. 210 1$aBerlin ;$aHeidelberg :$cSpringer Verlag,$d[1999] 210 4$d©1999 215 $a1 online resource (VIII, 268 p. 36 illus., 6 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1648 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-66362-2 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aElectronic Commerce -- Experimenting with Electronic Commerce on the PalmPilot -- Blinding of Credit Card Numbers in the SET Protocol -- Anonymity Control -- Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing -- Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems -- Fraud Management -- Risk Management for E-Cash Systems with Partial Real-Time Audit -- Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash -- Public-Key Certificates -- Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys -- Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance -- Steganography -- Playing ?Hide and Seek? with Stored Keys -- On Channel Capacity and Modulation of Watermarks in Digital Still Images -- Content Distribution -- Towards Making Broadcast Encryption Practical -- Conditional Access Concepts and Principles -- Fair Use, Intellectual Property, and the Information Economy -- Anonymity Mechanisms -- Anonymous Authentication of Membership in Dynamic Groups -- Some Open Issues and New Directions in Group Signatures -- Auctions and Markets -- Anonymous Investing: Hiding the Identities of Stockholders -- Fair On-Line Auctions without Special Trusted Parties -- Auctions and Markets -- Cryptosystems Robust against ?Dynamic Faults? Meet Enterprise Needs for Organizational ?Change Control? -- Improved Magic Ink Signatures Using Hints. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1648 606 $aElectronic funds transfers$xSecurity measures$vCongresses 606 $aData encryption (Computer science)$vCongresses 615 0$aElectronic funds transfers$xSecurity measures 615 0$aData encryption (Computer science) 676 $a332.178 702 $aFranklin$b Matthew 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a996465516703316 996 $aFinancial Cryptography$9772724 997 $aUNISA