Financial Cryptography Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings /

This book constitutes the thoroughly revised post-conference proceedings of the Second International Conference on Financial Cryptography, FC '98, held in Anguilla, British West Indies, in February 1998. The 28 revised papers presented were carefully selected and improved beyond the versions pr...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Hirschfeld, Rafael (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1998.
Έκδοση:1st ed. 1998.
Σειρά:Lecture Notes in Computer Science, 1465
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04687nam a2200625 4500
001 978-3-540-53918-6
003 DE-He213
005 20191026122014.0
007 cr nn 008mamaa
008 121227s1998 gw | s |||| 0|eng d
020 |a 9783540539186  |9 978-3-540-53918-6 
024 7 |a 10.1007/BFb0055468  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Financial Cryptography  |h [electronic resource] :  |b Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings /  |c edited by Rafael Hirschfeld. 
250 |a 1st ed. 1998. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 1998. 
300 |a VIII, 320 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1465 
505 0 |a Micro-payments via efficient coin-flipping -- X-Cash: Executable digital cash -- Distributed Trustees and revocability: A framework for internet payment -- A platform for privately defined currencies, loyalty credits, and play money -- Assessment of threats for smart card based electronic cash -- Using a high-performance, programmable secure coprocessor -- Secure group barter: Multi-party fair exchange with semi-trusted neutral parties -- A payment scheme using vouchers -- A formal specification of requirements for payment transactions in the SET protocol -- On assurance structures for WWW commerce -- Certificate revocation: Mechanics and meaning -- Revocatoin: Options and challenges -- On certificate revocation and validation -- Can we eliminate certificate revocation lists? -- Group blind digital signatures: A scalable solution to electronic cash -- Curbing junk e-mail via secure classification -- Publicly verifiable lotteries: Applications of delaying functions -- Robustness and security of digital watermarks -- Beyond identity: Warranty-based digital signature transactions -- Compliance checking in the PolicyMaker trust management system -- An efficient fair off-line electronic cash system with extensions to checks and wallets with observers -- A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem -- Cryptanalysis of SPEED. 
520 |a This book constitutes the thoroughly revised post-conference proceedings of the Second International Conference on Financial Cryptography, FC '98, held in Anguilla, British West Indies, in February 1998. The 28 revised papers presented were carefully selected and improved beyond the versions presented at the meeting. The book presents the state of the art in research and development in financial cryptography and addresses all current topics such as electronic payment systems, digital cash, electronic commerce, digital signatures, payment transactions, revocation and validation, WWW commerce, trust management systems, and watermarking. 
650 0 |a Computer security. 
650 0 |a Computers. 
650 0 |a Business. 
650 0 |a Management science. 
650 0 |a Data encryption (Computer science). 
650 0 |a Operating systems (Computers). 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 1 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Theory of Computation.  |0 http://scigraph.springernature.com/things/product-market-codes/I16005 
650 2 4 |a Business and Management, general.  |0 http://scigraph.springernature.com/things/product-market-codes/500000 
650 2 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
650 2 4 |a Operating Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I14045 
650 2 4 |a Management of Computing and Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I24067 
700 1 |a Hirschfeld, Rafael.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783662190067 
776 0 8 |i Printed edition:  |z 9783540649519 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1465 
856 4 0 |u https://doi.org/10.1007/BFb0055468  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)