Financial Cryptography 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001. Proceedings

Bibliographic Details
Other Authors: Syverson, Paul F. (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2002, 2002
Edition:1st ed. 2002
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 03307nmm a2200421 u 4500
001 EB000656999
003 EBX01000000000000000510081
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9783540460886 
100 1 |a Syverson, Paul F.  |e [editor] 
245 0 0 |a Financial Cryptography  |h Elektronische Ressource  |b 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001. Proceedings  |c edited by Paul F. Syverson 
250 |a 1st ed. 2002 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2002, 2002 
300 |a IX, 379 p  |b online resource 
505 0 |a Managing Payment Transaction Costs -- Amortized E-Cash -- Offline Micropayments without Trusted Hardware -- Panel (I) -- The Practical Problems of Implementing MicroMint -- Protecting Digital Rights -- Aspects of Digital Rights Management and the Use of Hardware Security Devices -- A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data -- Golden Times for Digital Rights Management? -- Applicability of Public Key Cryptosystems to Digital Rights Management Applications -- Trust and Risk Management -- On the Global Content PMI: Improved Copy-Protected Internet Content Distribution -- Trust: A Collision of Paradigms -- Groups and Anonymity -- On the Security of Homage Group Authentication Protocol -- Anonymity without ‘Cryptography’ -- Fair Tracing without Trustees -- Invited Talk -- Why the War on Money Laundering Should Be Aborted -- Certificates and Authentication -- Provably Secure Implicit Certificate Schemes -- Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation -- Mutual Authentication for Low-Power Mobile Devices -- Credit Card Security -- Off-Line Generation of Limited-Use Credit Card Numbers -- A Security Framework for Card-Based Systems -- SecureClick: A Web Payment System with Disposable Credit Card Numbers -- Panel (II) -- The Business of Electronic Voting -- Markets and Multiparty Computation -- Privacy for the Stock Market -- Secure Distributed Computing in a Commercial Environment -- Signatures in Financial Cryptography -- Monotone Signatures -- The Power of RSA Inversion Oracles and the Security of Chaum’s RSA-Based Blind Signature Scheme -- Optimistic Fair Exchange with Transparent Signature Recovery -- Auctions -- (M + 1)st-Price Auction Protocol -- Non-interactive Private Auctions 
653 |a Finance, Public 
653 |a Operating Systems 
653 |a Operating systems (Computers) 
653 |a Cryptography 
653 |a Electronic data processing / Management 
653 |a Data Structures and Information Theory 
653 |a Public Economics 
653 |a Information theory 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Data structures (Computer science) 
653 |a Cryptology 
653 |a Data and Information Security 
653 |a IT Operations 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a Lecture Notes in Computer Science 
028 5 0 |a 10.1007/3-540-46088-8 
856 4 0 |u https://doi.org/10.1007/3-540-46088-8?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 003.54 
082 0 |a 005.73