Buch, Englisch, Band 2339, 379 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 1220 g
5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001. Proceedings
Buch, Englisch, Band 2339, 379 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 1220 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-44079-6
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Wirtschaftswissenschaften Finanzsektor & Finanzdienstleistungen Finanzsektor & Finanzdienstleistungen: Allgemeines
- Mathematik | Informatik EDV | Informatik Betriebssysteme Windows Betriebssysteme
Weitere Infos & Material
Managing Payment Transaction Costs.- Amortized E-Cash.- Offline Micropayments without Trusted Hardware.- Panel (I).- The Practical Problems of Implementing MicroMint.- Protecting Digital Rights.- Aspects of Digital Rights Management and the Use of Hardware Security Devices.- A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data.- Golden Times for Digital Rights Management?.- Applicability of Public Key Cryptosystems to Digital Rights Management Applications.- Trust and Risk Management.- On the Global Content PMI: Improved Copy-Protected Internet Content Distribution.- Trust: A Collision of Paradigms.- Groups and Anonymity.- On the Security of Homage Group Authentication Protocol.- Anonymity without ‘Cryptography’.- Fair Tracing without Trustees.- Invited Talk.- Why the War on Money Laundering Should Be Aborted.- Certificates and Authentication.- Provably Secure Implicit Certificate Schemes.- Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation.- Mutual Authentication for Low-Power Mobile Devices.- Credit Card Security.- Off-Line Generation of Limited-Use Credit Card Numbers.- A Security Framework for Card-Based Systems.- SecureClick: A Web Payment System with Disposable Credit Card Numbers.- Panel (II).- The Business of Electronic Voting.- Markets and Multiparty Computation.- Privacy for the Stock Market.- Secure Distributed Computing in a Commercial Environment.- Signatures in Financial Cryptography.- Monotone Signatures.- The Power of RSA Inversion Oracles and the Security of Chaum’s RSA-Based Blind Signature Scheme.- Optimistic Fair Exchange with Transparent Signature Recovery.- Auctions.- (M + 1)st-Price Auction Protocol.- Non-interactive Private Auctions.