Financial Cryptography 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000 Proceedings /

Financial Cryptography 2000 marked the fourth time the technical, business, legal, and political communities from around the world joined together on the smallislandofAnguilla,BritishWestIndiestodiscussanddiscovernewadvances in securing electronic ?nancial transactions. The conference, sponsored by...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Frankel, Yair (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2001.
Έκδοση:1st ed. 2001.
Σειρά:Lecture Notes in Computer Science, 1962
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05866nam a2200613 4500
001 978-3-540-45472-4
003 DE-He213
005 20191025111356.0
007 cr nn 008mamaa
008 121227s2001 gw | s |||| 0|eng d
020 |a 9783540454724  |9 978-3-540-45472-4 
024 7 |a 10.1007/3-540-45472-1  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.D335 
072 7 |a GPJ  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.82  |2 23 
245 1 0 |a Financial Cryptography  |h [electronic resource] :  |b 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000 Proceedings /  |c edited by Yair Frankel. 
250 |a 1st ed. 2001. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2001. 
300 |a XII, 384 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1962 
505 0 |a Digital Rights Management -- Efficient Trace and Revoke Schemes -- Efficient Watermark Detection and Collusion Security -- Invited Lecture (I) -- Towards More Sensible Anti-circumvention Regulations -- Payment Systems -- Self-Escrowed Cash against User Blackmailing -- Blind, Auditable Membership Proofs -- Private Selective Payment Protocols -- Financial Cryptography Tools (I) -- Sharing Decryption in the Context of Voting or Lotteries -- Electronic Postcards -- Postal Revenue Collection in the Digital Age -- Signing on a Postcard -- Panel (I) -- Payment Systems: The Next Generation -- Abuses of Systems -- Non-repudiation in SET: Open Issues -- Statistics and Secret Leakage -- Analysis of Abuse-Free Contract Signing -- Asymmetric Currency Rounding -- Financial Crypto Policies and Issues -- The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel -- Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service Providers -- A Response to "Can We Eliminate Certificate Revocation Lists?" -- Anonymity -- Self-Scrambling Anonymizers -- Authentic Attributes with Fine-Grained Anonymity Protection -- Resource-Efficient Anonymous Group Identification -- Financial Cryptography Tools (I) -- Secret Key Authentication with Software-Only Verification -- Panel (I) -- Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else? -- System Architectures -- Financial Cryptography in 7 Layers -- Capability-Based Financial Instruments. 
520 |a Financial Cryptography 2000 marked the fourth time the technical, business, legal, and political communities from around the world joined together on the smallislandofAnguilla,BritishWestIndiestodiscussanddiscovernewadvances in securing electronic ?nancial transactions. The conference, sponsored by the International Financial Cryptography Association, was held on February 20- 24, 2000. The General Chair, Don Beaver, oversaw the local organization and registration. The program committee considered 68 submissions of which 21 papers were accepted. Each submitted paper was reviewed by a minimum of three referees. These proceedings contain revised versions of the 21 accepted papers. Revisions were not checked and the authors bear full responsibility for the content of their papers. This year's program also included two invited lectures, two panel sessions, and a rump session. The invited talks were given by Kevin McCurley prese- ing "In the Search of the Killer App" and Pam Samuelson presenting "Towards a More Sensible Way of Regulating the Circumvention of Technical Protection Systems". For the panel sessions, Barbara Fox and Brian LaMacchia mod- ated "Public-Key Infrastructure: PKIX, Signed XML, or Something Else" and Moti Yung moderated "Payment Systems: The Next Generation". Stuart Haber organized the informal rump session of short presentations. This was the ?rst year that the conference accepted submissions electro- cally as well as by postal mail. Many thanks to George Davida, the electronic submissions chair, for maintaining the electronic submissions server. A majority of the authors preferred electronic submissions with 65 of the 68 submissions provided electronically. 
650 0 |a Data encryption (Computer science). 
650 0 |a Finance. 
650 0 |a Architecture, Computer. 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Operating systems (Computers). 
650 0 |a Computer communication systems. 
650 1 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
650 2 4 |a Finance, general.  |0 http://scigraph.springernature.com/things/product-market-codes/600000 
650 2 4 |a Computer System Implementation.  |0 http://scigraph.springernature.com/things/product-market-codes/I13057 
650 2 4 |a Management of Computing and Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I24067 
650 2 4 |a Operating Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I14045 
650 2 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
700 1 |a Frankel, Yair.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783662168912 
776 0 8 |i Printed edition:  |z 9783540427001 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1962 
856 4 0 |u https://doi.org/10.1007/3-540-45472-1  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)