FEEDBACK Smiley face
Normal view MARC view ISBD view

Financial Cryptography [electronic resource] :5th International Conference, FC 2001 Grand Cayman, British West Indies, February 19–22, 2001 Proceedings /

Contributor(s): Syverson, Paul [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 2339Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2002.Description: IX, 379 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540460886.Subject(s): Computer science | Operating systems (Computers) | Computer security | Data structures (Computer science) | Data encryption (Computer science) | Management information systems | Public finance | Computer Science | Data Structures, Cryptology and Information Theory | Public Economics | Systems and Data Security | Data Encryption | Operating Systems | Management of Computing and Information SystemsOnline resources: Click here to access online
Contents:
Managing Payment Transaction Costs -- Amortized E-Cash -- Offline Micropayments without Trusted Hardware -- Panel (I) -- The Practical Problems of Implementing MicroMint -- Protecting Digital Rights -- Aspects of Digital Rights Management and the Use of Hardware Security Devices -- A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data -- Golden Times for Digital Rights Management? -- Applicability of Public Key Cryptosystems to Digital Rights Management Applications -- Trust and Risk Management -- On the Global Content PMI: Improved Copy-Protected Internet Content Distribution -- Trust: A Collision of Paradigms -- Groups and Anonymity -- On the Security of Homage Group Authentication Protocol -- Anonymity without ‘Cryptography’ -- Fair Tracing without Trustees -- Invited Talk -- Why the War on Money Laundering Should Be Aborted -- Certificates and Authentication -- Provably Secure Implicit Certificate Schemes -- Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation -- Mutual Authentication for Low-Power Mobile Devices -- Credit Card Security -- Off-Line Generation of Limited-Use Credit Card Numbers -- A Security Framework for Card-Based Systems -- SecureClick: A Web Payment System with Disposable Credit Card Numbers -- Panel (II) -- The Business of Electronic Voting -- Markets and Multiparty Computation -- Privacy for the Stock Market -- Secure Distributed Computing in a Commercial Environment -- Signatures in Financial Cryptography -- Monotone Signatures -- The Power of RSA Inversion Oracles and the Security of Chaum’s RSA-Based Blind Signature Scheme -- Optimistic Fair Exchange with Transparent Signature Recovery -- Auctions -- (M + 1)st-Price Auction Protocol -- Non-interactive Private Auctions.
In: Springer eBooks
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

Managing Payment Transaction Costs -- Amortized E-Cash -- Offline Micropayments without Trusted Hardware -- Panel (I) -- The Practical Problems of Implementing MicroMint -- Protecting Digital Rights -- Aspects of Digital Rights Management and the Use of Hardware Security Devices -- A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data -- Golden Times for Digital Rights Management? -- Applicability of Public Key Cryptosystems to Digital Rights Management Applications -- Trust and Risk Management -- On the Global Content PMI: Improved Copy-Protected Internet Content Distribution -- Trust: A Collision of Paradigms -- Groups and Anonymity -- On the Security of Homage Group Authentication Protocol -- Anonymity without ‘Cryptography’ -- Fair Tracing without Trustees -- Invited Talk -- Why the War on Money Laundering Should Be Aborted -- Certificates and Authentication -- Provably Secure Implicit Certificate Schemes -- Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation -- Mutual Authentication for Low-Power Mobile Devices -- Credit Card Security -- Off-Line Generation of Limited-Use Credit Card Numbers -- A Security Framework for Card-Based Systems -- SecureClick: A Web Payment System with Disposable Credit Card Numbers -- Panel (II) -- The Business of Electronic Voting -- Markets and Multiparty Computation -- Privacy for the Stock Market -- Secure Distributed Computing in a Commercial Environment -- Signatures in Financial Cryptography -- Monotone Signatures -- The Power of RSA Inversion Oracles and the Security of Chaum’s RSA-Based Blind Signature Scheme -- Optimistic Fair Exchange with Transparent Signature Recovery -- Auctions -- (M + 1)st-Price Auction Protocol -- Non-interactive Private Auctions.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in