LEADER 06559nam 22008295 450 001 996466180703316 005 20200704084942.0 010 $a3-540-45472-1 024 7 $a10.1007/3-540-45472-1 035 $a(CKB)1000000000211362 035 $a(SSID)ssj0000323140 035 $a(PQKBManifestationID)11243252 035 $a(PQKBTitleCode)TC0000323140 035 $a(PQKBWorkID)10296446 035 $a(PQKB)11564228 035 $a(DE-He213)978-3-540-45472-4 035 $a(MiAaPQ)EBC3072657 035 $a(PPN)155182013 035 $a(EXLCZ)991000000000211362 100 $a20121227d2001 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFinancial Cryptography$b[electronic resource] $e4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000 Proceedings /$fedited by Yair Frankel 205 $a1st ed. 2001. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2001. 215 $a1 online resource (XII, 384 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1962 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-42700-7 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aDigital Rights Management -- Efficient Trace and Revoke Schemes -- Efficient Watermark Detection and Collusion Security -- Invited Lecture (I) -- Towards More Sensible Anti-circumvention Regulations -- Payment Systems -- Self-Escrowed Cash against User Blackmailing -- Blind, Auditable Membership Proofs -- Private Selective Payment Protocols -- Financial Cryptography Tools (I) -- Sharing Decryption in the Context of Voting or Lotteries -- Electronic Postcards -- Postal Revenue Collection in the Digital Age -- Signing on a Postcard -- Panel (I) -- Payment Systems: The Next Generation -- Abuses of Systems -- Non-repudiation in SET: Open Issues -- Statistics and Secret Leakage -- Analysis of Abuse-Free Contract Signing -- Asymmetric Currency Rounding -- Financial Crypto Policies and Issues -- The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel -- Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service Providers -- A Response to ?Can We Eliminate Certificate Revocation Lists?? -- Anonymity -- Self-Scrambling Anonymizers -- Authentic Attributes with Fine-Grained Anonymity Protection -- Resource-Efficient Anonymous Group Identification -- Financial Cryptography Tools (I) -- Secret Key Authentication with Software-Only Verification -- Panel (I) -- Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else? -- System Architectures -- Financial Cryptography in 7 Layers -- Capability-Based Financial Instruments. 330 $aFinancial Cryptography 2000 marked the fourth time the technical, business, legal, and political communities from around the world joined together on the smallislandofAnguilla,BritishWestIndiestodiscussanddiscovernewadvances in securing electronic ?nancial transactions. The conference, sponsored by the International Financial Cryptography Association, was held on February 20? 24, 2000. The General Chair, Don Beaver, oversaw the local organization and registration. The program committee considered 68 submissions of which 21 papers were accepted. Each submitted paper was reviewed by a minimum of three referees. These proceedings contain revised versions of the 21 accepted papers. Revisions were not checked and the authors bear full responsibility for the content of their papers. This year?s program also included two invited lectures, two panel sessions, and a rump session. The invited talks were given by Kevin McCurley prese- ing ?In the Search of the Killer App? and Pam Samuelson presenting ?Towards a More Sensible Way of Regulating the Circumvention of Technical Protection Systems?. For the panel sessions, Barbara Fox and Brian LaMacchia mod- ated ?Public-Key Infrastructure: PKIX, Signed XML, or Something Else? and Moti Yung moderated ?Payment Systems: The Next Generation?. Stuart Haber organized the informal rump session of short presentations. This was the ?rst year that the conference accepted submissions electro- cally as well as by postal mail. Many thanks to George Davida, the electronic submissions chair, for maintaining the electronic submissions server. A majority of the authors preferred electronic submissions with 65 of the 68 submissions provided electronically. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1962 606 $aData encryption (Computer science) 606 $aFinance 606 $aArchitecture, Computer 606 $aManagement information systems 606 $aComputer science 606 $aOperating systems (Computers) 606 $aComputer communication systems 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aFinance, general$3https://scigraph.springernature.com/ontologies/product-market-codes/600000 606 $aComputer System Implementation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13057 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aData encryption (Computer science). 615 0$aFinance. 615 0$aArchitecture, Computer. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aOperating systems (Computers). 615 0$aComputer communication systems. 615 14$aCryptology. 615 24$aFinance, general. 615 24$aComputer System Implementation. 615 24$aManagement of Computing and Information Systems. 615 24$aOperating Systems. 615 24$aComputer Communication Networks. 676 $a332.10285 702 $aFrankel$b Yair$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aFC 2000 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466180703316 996 $aFinancial Cryptography$9772724 997 $aUNISA