Financial Cryptography
Springer Berlin (Verlag)
978-3-540-42700-1 (ISBN)
Digital Rights Management.- Efficient Trace and Revoke Schemes.- Efficient Watermark Detection and Collusion Security.- Invited Lecture (I).- Towards More Sensible Anti-circumvention Regulations.- Payment Systems.- Self-Escrowed Cash against User Blackmailing.- Blind, Auditable Membership Proofs.- Private Selective Payment Protocols.- Financial Cryptography Tools (I).- Sharing Decryption in the Context of Voting or Lotteries.- Electronic Postcards.- Postal Revenue Collection in the Digital Age.- Signing on a Postcard.- Panel (I).- Payment Systems: The Next Generation.- Abuses of Systems.- Non-repudiation in SET: Open Issues.- Statistics and Secret Leakage.- Analysis of Abuse-Free Contract Signing.- Asymmetric Currency Rounding.- Financial Crypto Policies and Issues.- The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel.- Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service Providers.- A Response to "Can We Eliminate Certificate Revocation Lists?".- Anonymity.- Self-Scrambling Anonymizers.- Authentic Attributes with Fine-Grained Anonymity Protection.- Resource-Efficient Anonymous Group Identification.- Financial Cryptography Tools (I).- Secret Key Authentication with Software-Only Verification.- Panel (I).- Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else?.- System Architectures.- Financial Cryptography in 7 Layers.- Capability-Based Financial Instruments.
Erscheint lt. Verlag | 10.10.2001 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XII, 384 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 553 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | authentication • cryptography • Cryptology • Digital Payment Systems • Digital Signature Systems • Electronic Cash • Financial Transactions • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Key Enscrowment • Public-Key Infrastructure • secure communication • Tools |
ISBN-10 | 3-540-42700-7 / 3540427007 |
ISBN-13 | 978-3-540-42700-1 / 9783540427001 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich