Financial Cryptography [electronic resource] : 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001. Proceedings / edited by Paul F. Syverson.

Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
1 online resource (IX, 379 pages)
1st ed. 2002.
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 2339
Lecture Notes in Computer Science, 0302-9743 ; 2339
Contained In:
Springer eBooks

Location Notes Your Loan Policy


Data structures (Computer science).
Finance, Public.
Computer security.
Data encryption (Computer science).
Operating systems (Computers).
Management information systems.
Computer science.
Local subjects:
Data Structures and Information Theory. (search)
Public Economics. (search)
Systems and Data Security. (search)
Cryptology. (search)
Operating Systems. (search)
Management of Computing and Information Systems. (search)
System Details:
text file PDF
Managing Payment Transaction Costs
Amortized E-Cash
Offline Micropayments without Trusted Hardware
Panel (I)
The Practical Problems of Implementing MicroMint
Protecting Digital Rights
Aspects of Digital Rights Management and the Use of Hardware Security Devices
A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data
Golden Times for Digital Rights Management?
Applicability of Public Key Cryptosystems to Digital Rights Management Applications
Trust and Risk Management
On the Global Content PMI: Improved Copy-Protected Internet Content Distribution
Trust: A Collision of Paradigms
Groups and Anonymity
On the Security of Homage Group Authentication Protocol
Anonymity without 'Cryptography'
Fair Tracing without Trustees
Invited Talk
Why the War on Money Laundering Should Be Aborted
Certificates and Authentication
Provably Secure Implicit Certificate Schemes
Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation
Mutual Authentication for Low-Power Mobile Devices
Credit Card Security
Off-Line Generation of Limited-Use Credit Card Numbers
A Security Framework for Card-Based Systems
SecureClick: A Web Payment System with Disposable Credit Card Numbers
Panel (II)
The Business of Electronic Voting
Markets and Multiparty Computation
Privacy for the Stock Market
Secure Distributed Computing in a Commercial Environment
Signatures in Financial Cryptography
Monotone Signatures
The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme
Optimistic Fair Exchange with Transparent Signature Recovery
(M + 1)st-Price Auction Protocol
Non-interactive Private Auctions.
Syverson, Paul F. editor., Editor,
SpringerLink (Online service)
Other format:
Printed edition:
Printed edition:
Publisher Number:
10.1007/3-540-46088-8 doi
Access Restriction:
Restricted for use by site license.