HOME > Detail View

Detail View

Financial cryptography : 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003 : revised papers

Financial cryptography : 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003 : revised papers

Material type
단행본
Personal Author
Wright, Rebecca N., 1967-.
Title Statement
Financial cryptography : 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003 : revised papers / Rebecca N. Wright (ed.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   2003.  
Physical Medium
viii, 320 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 2742
ISBN
3540406638 (pbk. : alk. paper) 9783540406631 (pbk. : alk. paper)
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Electronic funds transfers -- Security measures -- Congresses. Data encryption (Computer science) -- Congresses. Electronic commerce -- Security measures -- Congresses. Internet -- Security measures -- Congresses. Computer networks -- Security measures -- Congresses.
000 01712camuu2200409 a 4500
001 000045561360
005 20091124172539
008 030717s2003 gw a b 101 0 eng
010 ▼a 2003058136
020 ▼a 3540406638 (pbk. : alk. paper)
020 ▼a 9783540406631 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm52720586
035 ▼a (OCoLC)52720586
035 ▼a (KERIS)REF000009535339
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a HG1710 ▼b .F35 2003
082 0 0 ▼a 332.1/78 ▼2 22
082 0 4 ▼a 332.1/0285 s ▼2 22
090 ▼a 332.10285 ▼b F287f ▼c 2003
111 2 ▼a FC 2003 ▼d (2003 : ▼c Guadeloupe)
245 1 0 ▼a Financial cryptography : ▼b 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003 : revised papers / ▼c Rebecca N. Wright (ed.).
246 3 0 ▼a FC 2003
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c 2003.
300 ▼a viii, 320 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 2742
504 ▼a Includes bibliographical references and index.
650 0 ▼a Electronic funds transfers ▼x Security measures ▼v Congresses.
650 0 ▼a Data encryption (Computer science) ▼v Congresses.
650 0 ▼a Electronic commerce ▼x Security measures ▼v Congresses.
650 0 ▼a Internet ▼x Security measures ▼v Congresses.
650 0 ▼a Computer networks ▼x Security measures ▼v Congresses.
700 1 ▼a Wright, Rebecca N., ▼d 1967-.
830 0 ▼a Lecture notes in computer science ; ▼v 2742.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 332.10285 F287f 2003 Accession No. 121186806 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Micropayment and E-cash.- Using Trust Management to Support Transferable Hash-Based Micropayments.- A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.- On the Anonymity of Fair Offline E-cash Systems.- Retrofitting Fairness on the Original RSA-Based E-cash.- Panel: Does Anyone Really Need MicroPayments?.- Does Anyone Really Need MicroPayments?.- The Case Against Micropayments.- Security, Anonymity, and Privacy.- On the Economics of Anonymity.- Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.- How Much Security Is Enough to Stop a Thief?.- Attacks.- Cryptanalysis of the OTM Signature Scheme from FC'02.- "Man in the Middle" Attacks on Bluetooth.- Fault Based Cryptanalysis of the Advanced Encryption Standard (AES).- Panel: Economics of Security.- Economics, Psychology, and Sociology of Security.- Fair Exchange.- Timed Fair Exchange of Standard Signatures.- Asynchronous Optimistic Fair Exchange Based on Revocable Items.- Auctions.- Fully Private Auctions in a Constant Number of Rounds.- Secure Generalized Vickrey Auction Using Homomorphic Encryption.- Panel: Trusted Computing Platforms.- Trusted Computing Platforms: The Good, the Bad, and the Ugly.- On TCPA.- Cryptographic Tools and Primitives.- On The Computation-Storage Trade-Offs of Hash Chain Traversal.- Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures.- Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.


Information Provided By: : Aladin

New Arrivals Books in Related Fields

한국핀테크지원센터 (2021)
Vague, Richard (2022)