Financial Cryptography 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers

Bibliographic Details
Other Authors: Wright, Rebecca N. (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2003, 2003
Edition:1st ed. 2003
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 02919nmm a2200385 u 4500
001 EB000656249
003 EBX01000000000000000509331
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9783540451266 
100 1 |a Wright, Rebecca N.  |e [editor] 
245 0 0 |a Financial Cryptography  |h Elektronische Ressource  |b 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers  |c edited by Rebecca N. Wright 
250 |a 1st ed. 2003 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2003, 2003 
300 |a VIII, 328 p  |b online resource 
505 0 |a Micropayment and E-cash -- Using Trust Management to Support Transferable Hash-Based Micropayments -- A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks -- On the Anonymity of Fair Offline E-cash Systems -- Retrofitting Fairness on the Original RSA-Based E-cash -- Panel: Does Anyone Really Need MicroPayments? -- Does Anyone Really Need MicroPayments? -- The Case Against Micropayments -- Security, Anonymity, and Privacy -- On the Economics of Anonymity -- Squealing Euros: Privacy Protection in RFID-Enabled Banknotes -- How Much Security Is Enough to Stop a Thief? -- Attacks -- Cryptanalysis of the OTM Signature Scheme from FC’02 -- “Man in the Middle” Attacks on Bluetooth -- Fault Based Cryptanalysis of the Advanced Encryption Standard (AES) -- Panel: Economics of Security -- Economics, Psychology, and Sociology of Security -- Fair Exchange -- Timed Fair Exchange of Standard Signatures -- Asynchronous Optimistic Fair Exchange Based on Revocable Items -- Auctions -- Fully Private Auctions in a Constant Number of Rounds -- Secure Generalized Vickrey Auction Using Homomorphic Encryption -- Panel: Trusted Computing Platforms -- Trusted Computing Platforms: The Good, the Bad, and the Ugly -- On TCPA -- Cryptographic Tools and Primitives -- On The Computation-Storage Trade-Offs of Hash Chain Traversal -- Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures -- Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making 
653 |a Computer Communication Networks 
653 |a Computers and Society 
653 |a Finance 
653 |a Operating Systems 
653 |a Operating systems (Computers) 
653 |a Cryptography 
653 |a Algorithms 
653 |a Computer networks  
653 |a Data encryption (Computer science) 
653 |a Financial Economics 
653 |a Cryptology 
653 |a Computers and civilization 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a Lecture Notes in Computer Science 
028 5 0 |a 10.1007/978-3-540-45126-6 
856 4 0 |u https://doi.org/10.1007/978-3-540-45126-6?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 332