Buch, Englisch, Band 1648, 268 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 429 g
Third International Conference, FC¿99 Anguilla, British West Indies, February 22¿25, 1999 Proceedings
Buch, Englisch, Band 1648, 268 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 429 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-66362-1
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Wirtschaftswissenschaften Betriebswirtschaft Bereichsspezifisches Management E-Commerce, E-Business, E-Marketing
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Wirtschaftswissenschaften Finanzsektor & Finanzdienstleistungen Bankwirtschaft
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
Weitere Infos & Material
Electronic Commerce.- Experimenting with Electronic Commerce on the PalmPilot.- Blinding of Credit Card Numbers in the SET Protocol.- Anonymity Control.- Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing.- Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems.- Fraud Management.- Risk Management for E-Cash Systems with Partial Real-Time Audit.- Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash.- Public-Key Certificates.- Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys.- Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance.- Steganography.- Playing ‘Hide and Seek’ with Stored Keys.- On Channel Capacity and Modulation of Watermarks in Digital Still Images.- Content Distribution.- Towards Making Broadcast Encryption Practical.- Conditional Access Concepts and Principles.- Fair Use, Intellectual Property, and the Information Economy.- Anonymity Mechanisms.- Anonymous Authentication of Membership in Dynamic Groups.- Some Open Issues and New Directions in Group Signatures.- Auctions and Markets.- Anonymous Investing: Hiding the Identities of Stockholders.- Fair On-Line Auctions without Special Trusted Parties.- Auctions and Markets.- Cryptosystems Robust against “Dynamic Faults” Meet Enterprise Needs for Organizational “Change Control”.- Improved Magic Ink Signatures Using Hints.