000 03785nam a22006495i 4500
001 978-3-540-48390-8
003 DE-He213
005 20240423132526.0
007 cr nn 008mamaa
008 121227s1999 gw | s |||| 0|eng d
020 _a9783540483908
_9978-3-540-48390-8
024 7 _a10.1007/3-540-48390-X
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aFinancial Cryptography
_h[electronic resource] :
_bThird International Conference, FC’99 Anguilla, British West Indies, February 22–25, 1999 Proceedings /
_cedited by Matthew Franklin.
250 _a1st ed. 1999.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c1999.
300 _aVIII, 268 p. 36 illus., 6 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1648
505 0 _aElectronic Commerce -- Experimenting with Electronic Commerce on the PalmPilot -- Blinding of Credit Card Numbers in the SET Protocol -- Anonymity Control -- Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing -- Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems -- Fraud Management -- Risk Management for E-Cash Systems with Partial Real-Time Audit -- Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash -- Public-Key Certificates -- Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys -- Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance -- Steganography -- Playing ‘Hide and Seek’ with Stored Keys -- On Channel Capacity and Modulation of Watermarks in Digital Still Images -- Content Distribution -- Towards Making Broadcast Encryption Practical -- Conditional Access Concepts and Principles -- Fair Use, Intellectual Property, and the Information Economy -- Anonymity Mechanisms -- Anonymous Authentication of Membership in Dynamic Groups -- Some Open Issues and New Directions in Group Signatures -- Auctions and Markets -- Anonymous Investing: Hiding the Identities of Stockholders -- Fair On-Line Auctions without Special Trusted Parties -- Auctions and Markets -- Cryptosystems Robust against “Dynamic Faults” Meet Enterprise Needs for Organizational “Change Control” -- Improved Magic Ink Signatures Using Hints.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aFinance.
650 0 _aComputer networks .
650 0 _aElectronic data processing
_xManagement.
650 0 _aBusiness information services.
650 0 _aAlgorithms.
650 1 4 _aCryptology.
650 2 4 _aFinancial Economics.
650 2 4 _aComputer Communication Networks.
650 2 4 _aIT Operations.
650 2 4 _aIT in Business.
650 2 4 _aAlgorithms.
700 1 _aFranklin, Matthew.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540663621
776 0 8 _iPrinted edition:
_z9783662184912
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1648
856 4 0 _uhttps://doi.org/10.1007/3-540-48390-X
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c188713
_d188713