Amazon cover image
Image from Amazon.com

Financial Cryptography : Third International Conference, FC99 Anguilla, British West Indies, February 2225, 1999 Proceedings / edited by Matthew Franklin.

Contributor(s): Franklin, MatthewMaterial type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 1648,Publication details: Berlin ; Heidelberg : Springer-Verlag Berlin Heidelberg, 1999. Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540483908; 354048390X; 9783540663621; 3540663622Subject(s): Electronic funds transfers -- Security measures -- Congresses | Data encryption (Computer science) -- Congresses | Electronic commerce -- Security measures -- Congresses | Internet -- Security measures -- Congresses | Computer networks -- Security measures -- Congresses | Computer science | Computer software | Management information systems | Computer networks -- Security measures | Computer science | Computer software | Data encryption (Computer science) | Electronic commerce -- Security measures | Electronic funds transfers -- Security measures | Internet -- Security measures | Management information systemsGenre/Form: Electronic books. | Electronic books. | Conference papers and proceedings. Additional physical formats: Printed edition: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Other classification: 54.62 | SS 1999 | SS 4800 | 17 | 28 | DAT 465f Online resources: Click here to access online
Contents:
Electronic Commerce -- Experimenting with Electronic Commerce on the PalmPilot -- Blinding of Credit Card Numbers in the SET Protocol -- Anonymity Control -- Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing -- Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems -- Fraud Management -- Risk Management for E-Cash Systems with Partial Real-Time Audit -- Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash -- Public-Key Certificates -- Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys -- Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance -- Steganography -- Playing 'Hide and Seek' with Stored Keys -- On Channel Capacity and Modulation of Watermarks in Digital Still Images -- Content Distribution -- Towards Making Broadcast Encryption Practical -- Conditional Access Concepts and Principles -- Fair Use, Intellectual Property, and the Information Economy -- Anonymity Mechanisms -- Anonymous Authentication of Membership in Dynamic Groups -- Some Open Issues and New Directions in Group Signatures -- Auctions and Markets -- Anonymous Investing: Hiding the Identities of Stockholders -- Fair On-Line Auctions without Special Trusted Parties -- Auctions and Markets -- Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control" -- Improved Magic Ink Signatures Using Hints.
Summary: This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Financial Cryptography, FC'99, held in Anguilla, British West Indies in February 1999. The 19 revised full papers presented were carefully reviewed for inclusion in the book. The papers are organized in sections on electronic commerce, anonymity control, fraud management, public-key certificates, steganography, content distribution, anonymity mechanisms, auctions and markets, and distributed cryptography.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Financial Cryptography, FC'99, held in Anguilla, British West Indies in February 1999. The 19 revised full papers presented were carefully reviewed for inclusion in the book. The papers are organized in sections on electronic commerce, anonymity control, fraud management, public-key certificates, steganography, content distribution, anonymity mechanisms, auctions and markets, and distributed cryptography.

Electronic Commerce -- Experimenting with Electronic Commerce on the PalmPilot -- Blinding of Credit Card Numbers in the SET Protocol -- Anonymity Control -- Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing -- Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems -- Fraud Management -- Risk Management for E-Cash Systems with Partial Real-Time Audit -- Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash -- Public-Key Certificates -- Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys -- Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance -- Steganography -- Playing 'Hide and Seek' with Stored Keys -- On Channel Capacity and Modulation of Watermarks in Digital Still Images -- Content Distribution -- Towards Making Broadcast Encryption Practical -- Conditional Access Concepts and Principles -- Fair Use, Intellectual Property, and the Information Economy -- Anonymity Mechanisms -- Anonymous Authentication of Membership in Dynamic Groups -- Some Open Issues and New Directions in Group Signatures -- Auctions and Markets -- Anonymous Investing: Hiding the Identities of Stockholders -- Fair On-Line Auctions without Special Trusted Parties -- Auctions and Markets -- Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control" -- Improved Magic Ink Signatures Using Hints.

English.

Includes bibliographical references at the end of each chapters and index.

Powered by Koha