FEEDBACK Smiley face
Normal view MARC view ISBD view

Financial Cryptography [electronic resource] :Third International Conference, FC’99 Anguilla, British West Indies, February 22–25, 1999 Proceedings /

Contributor(s): Franklin, Matthew [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 1648Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1999.Description: VIII, 268 p. 36 illus., 6 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540483908.Subject(s): Computer science | Information technology | Business -- Data processing | Finance | Computer communication systems | Data encryption (Computer science) | Algorithms | Management information systems | Computer Science | Data Encryption | Finance, general | Computer Communication Networks | Management of Computing and Information Systems | IT in Business | Algorithm Analysis and Problem ComplexityOnline resources: Click here to access online
Contents:
Electronic Commerce -- Experimenting with Electronic Commerce on the PalmPilot -- Blinding of Credit Card Numbers in the SET Protocol -- Anonymity Control -- Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing -- Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems -- Fraud Management -- Risk Management for E-Cash Systems with Partial Real-Time Audit -- Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash -- Public-Key Certificates -- Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys -- Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance -- Steganography -- Playing ‘Hide and Seek’ with Stored Keys -- On Channel Capacity and Modulation of Watermarks in Digital Still Images -- Content Distribution -- Towards Making Broadcast Encryption Practical -- Conditional Access Concepts and Principles -- Fair Use, Intellectual Property, and the Information Economy -- Anonymity Mechanisms -- Anonymous Authentication of Membership in Dynamic Groups -- Some Open Issues and New Directions in Group Signatures -- Auctions and Markets -- Anonymous Investing: Hiding the Identities of Stockholders -- Fair On-Line Auctions without Special Trusted Parties -- Auctions and Markets -- Cryptosystems Robust against “Dynamic Faults” Meet Enterprise Needs for Organizational “Change Control” -- Improved Magic Ink Signatures Using Hints.
In: Springer eBooks
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

Electronic Commerce -- Experimenting with Electronic Commerce on the PalmPilot -- Blinding of Credit Card Numbers in the SET Protocol -- Anonymity Control -- Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing -- Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems -- Fraud Management -- Risk Management for E-Cash Systems with Partial Real-Time Audit -- Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash -- Public-Key Certificates -- Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys -- Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance -- Steganography -- Playing ‘Hide and Seek’ with Stored Keys -- On Channel Capacity and Modulation of Watermarks in Digital Still Images -- Content Distribution -- Towards Making Broadcast Encryption Practical -- Conditional Access Concepts and Principles -- Fair Use, Intellectual Property, and the Information Economy -- Anonymity Mechanisms -- Anonymous Authentication of Membership in Dynamic Groups -- Some Open Issues and New Directions in Group Signatures -- Auctions and Markets -- Anonymous Investing: Hiding the Identities of Stockholders -- Fair On-Line Auctions without Special Trusted Parties -- Auctions and Markets -- Cryptosystems Robust against “Dynamic Faults” Meet Enterprise Needs for Organizational “Change Control” -- Improved Magic Ink Signatures Using Hints.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in