000 04202nam a22006855i 4500
001 978-3-540-46088-6
003 DE-He213
005 20240423132542.0
007 cr nn 008mamaa
008 121227s2002 gw | s |||| 0|eng d
020 _a9783540460886
_9978-3-540-46088-6
024 7 _a10.1007/3-540-46088-8
_2doi
050 4 _aQA76.9.D35
050 4 _aQ350-390
072 7 _aUMB
_2bicssc
072 7 _aGPF
_2bicssc
072 7 _aCOM021000
_2bisacsh
072 7 _aUMB
_2thema
072 7 _aGPF
_2thema
082 0 4 _a005.73
_223
082 0 4 _a003.54
_223
245 1 0 _aFinancial Cryptography
_h[electronic resource] :
_b5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001. Proceedings /
_cedited by Paul F. Syverson.
250 _a1st ed. 2002.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2002.
300 _aIX, 379 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2339
505 0 _aManaging Payment Transaction Costs -- Amortized E-Cash -- Offline Micropayments without Trusted Hardware -- Panel (I) -- The Practical Problems of Implementing MicroMint -- Protecting Digital Rights -- Aspects of Digital Rights Management and the Use of Hardware Security Devices -- A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data -- Golden Times for Digital Rights Management? -- Applicability of Public Key Cryptosystems to Digital Rights Management Applications -- Trust and Risk Management -- On the Global Content PMI: Improved Copy-Protected Internet Content Distribution -- Trust: A Collision of Paradigms -- Groups and Anonymity -- On the Security of Homage Group Authentication Protocol -- Anonymity without ‘Cryptography’ -- Fair Tracing without Trustees -- Invited Talk -- Why the War on Money Laundering Should Be Aborted -- Certificates and Authentication -- Provably Secure Implicit Certificate Schemes -- Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation -- Mutual Authentication for Low-Power Mobile Devices -- Credit Card Security -- Off-Line Generation of Limited-Use Credit Card Numbers -- A Security Framework for Card-Based Systems -- SecureClick: A Web Payment System with Disposable Credit Card Numbers -- Panel (II) -- The Business of Electronic Voting -- Markets and Multiparty Computation -- Privacy for the Stock Market -- Secure Distributed Computing in a Commercial Environment -- Signatures in Financial Cryptography -- Monotone Signatures -- The Power of RSA Inversion Oracles and the Security of Chaum’s RSA-Based Blind Signature Scheme -- Optimistic Fair Exchange with Transparent Signature Recovery -- Auctions -- (M + 1)st-Price Auction Protocol -- Non-interactive Private Auctions.
650 0 _aData structures (Computer science).
650 0 _aInformation theory.
650 0 _aFinance, Public.
650 0 _aData protection.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aOperating systems (Computers).
650 0 _aElectronic data processing
_xManagement.
650 1 4 _aData Structures and Information Theory.
650 2 4 _aPublic Economics.
650 2 4 _aData and Information Security.
650 2 4 _aCryptology.
650 2 4 _aOperating Systems.
650 2 4 _aIT Operations.
700 1 _aSyverson, Paul F.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540440796
776 0 8 _iPrinted edition:
_z9783540830122
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2339
856 4 0 _uhttps://doi.org/10.1007/3-540-46088-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c189028
_d189028