000 | 04875nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-540-69607-0 | ||
003 | DE-He213 | ||
005 | 20240423132438.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s1997 gw | s |||| 0|eng d | ||
020 |
_a9783540696070 _9978-3-540-69607-0 |
||
024 | 7 |
_a10.1007/3-540-63594-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aFinancial Cryptography _h[electronic resource] : _bFirst International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997. Proceedings / _cedited by Rafael Hirschfeld. |
250 | _a1st ed. 1997. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c1997. |
|
300 |
_aXII, 416 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1318 |
|
505 | 0 | _aAnonymity control in E-cash systems -- How to make personalized web browsing simple, secure, and anonymous -- Anonymous networking and virtual intranets: Tools for anonymous corporations -- Unlinkable serial transactions -- Efficient electronic cash with restricted privacy -- The SPEED cipher -- Evaluating the security of electronic money -- Electronic cash-technology will denationalise money -- Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective -- Some critical remarks on “dynamic data authentication” as specified in EMV '96 -- Single-chip implementation of a cryptosystem for financial applications -- Perspectives on financial cryptography -- Auditable metering with lightweight security -- SVP: A flexible micropayment scheme -- An efficient micropayment system based on probabilistic polling -- On the continuum between on-line and off-line E-cash systems — I -- Towards multiple-payment schemes for digital money -- Applying anti-trust policies to increase trust in a versatile e-money system -- The uses and limits of financial cryptography: A law professor's perspective -- Legal issues in cryptography -- Digital signatures today -- An Attorney's Roadmap to the Digital Signature Guidelines -- Alternative visions for legal signatures and evidence -- Money laundering: Past, present and future -- Electronic lottery tickets as micropayments -- Strategic tasks for government in the information age -- Using electronic markets to achieve efficient task distribution -- The gateway security model in the Java Electronic Commerce Framework -- Highly scalable on-line payments via task decoupling -- GUMP Grand Unified Meta-Protocols recipes for simple, standards-based financial cryptography -- Secure network communications and secure store & forward mechanisms withinthe SAP R/3 system. | |
520 | _aThis book constitutes the strictly refereed post-proceedings of the First International Conference on Financial Cryptography, FC '97, held in Anguilla, BWI, in February 1997. The 31 revised contributions presented were carefully reviewed and revised for inclusion in the book. The book provides a unique synopsis on financial cryptography, taking into account the views and ideas of cryptographers, security experts, computer hackers, lawyers, bankers, journalists and administrative professionals. The papers cover the whole spectrum of the security of financial transactions or digital commerce in general, ranging from pure cryptosystems to the technology of electronic money to legal and regulatory policy issues. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer science. | |
650 | 0 | _aBusiness. | |
650 | 0 | _aManagement science. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aBusiness information services. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aTheory of Computation. |
650 | 2 | 4 | _aBusiness and Management. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aOperating Systems. |
650 | 2 | 4 | _aIT in Business. |
700 | 1 |
_aHirschfeld, Rafael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540635949 |
776 | 0 | 8 |
_iPrinted edition: _z9783662172247 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1318 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/3-540-63594-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
912 | _aZDB-2-BAE | ||
942 | _cSPRINGER | ||
999 |
_c187841 _d187841 |