|
|
|
|
LEADER |
02919nmm a2200385 u 4500 |
001 |
EB000656249 |
003 |
EBX01000000000000000509331 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
140122 ||| eng |
020 |
|
|
|a 9783540451266
|
100 |
1 |
|
|a Wright, Rebecca N.
|e [editor]
|
245 |
0 |
0 |
|a Financial Cryptography
|h Elektronische Ressource
|b 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers
|c edited by Rebecca N. Wright
|
250 |
|
|
|a 1st ed. 2003
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2003, 2003
|
300 |
|
|
|a VIII, 328 p
|b online resource
|
505 |
0 |
|
|a Micropayment and E-cash -- Using Trust Management to Support Transferable Hash-Based Micropayments -- A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks -- On the Anonymity of Fair Offline E-cash Systems -- Retrofitting Fairness on the Original RSA-Based E-cash -- Panel: Does Anyone Really Need MicroPayments? -- Does Anyone Really Need MicroPayments? -- The Case Against Micropayments -- Security, Anonymity, and Privacy -- On the Economics of Anonymity -- Squealing Euros: Privacy Protection in RFID-Enabled Banknotes -- How Much Security Is Enough to Stop a Thief? -- Attacks -- Cryptanalysis of the OTM Signature Scheme from FC’02 -- “Man in the Middle” Attacks on Bluetooth -- Fault Based Cryptanalysis of the Advanced Encryption Standard (AES) -- Panel: Economics of Security -- Economics, Psychology, and Sociology of Security -- Fair Exchange -- Timed Fair Exchange of Standard Signatures -- Asynchronous Optimistic Fair Exchange Based on Revocable Items -- Auctions -- Fully Private Auctions in a Constant Number of Rounds -- Secure Generalized Vickrey Auction Using Homomorphic Encryption -- Panel: Trusted Computing Platforms -- Trusted Computing Platforms: The Good, the Bad, and the Ugly -- On TCPA -- Cryptographic Tools and Primitives -- On The Computation-Storage Trade-Offs of Hash Chain Traversal -- Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures -- Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Computers and Society
|
653 |
|
|
|a Finance
|
653 |
|
|
|a Operating Systems
|
653 |
|
|
|a Operating systems (Computers)
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Algorithms
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Financial Economics
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Computers and civilization
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b SBA
|a Springer Book Archives -2004
|
490 |
0 |
|
|a Lecture Notes in Computer Science
|
028 |
5 |
0 |
|a 10.1007/978-3-540-45126-6
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-540-45126-6?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 332
|