|
|
|
|
LEADER |
05165nam a2200625 4500 |
001 |
978-3-540-69607-0 |
003 |
DE-He213 |
005 |
20191220130556.0 |
007 |
cr nn 008mamaa |
008 |
121227s1997 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540696070
|9 978-3-540-69607-0
|
024 |
7 |
|
|a 10.1007/3-540-63594-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Financial Cryptography
|h [electronic resource] :
|b First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997. Proceedings /
|c edited by Rafael Hirschfeld.
|
250 |
|
|
|a 1st ed. 1997.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 1997.
|
300 |
|
|
|a XII, 416 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 1318
|
505 |
0 |
|
|a Anonymity control in E-cash systems -- How to make personalized web browsing simple, secure, and anonymous -- Anonymous networking and virtual intranets: Tools for anonymous corporations -- Unlinkable serial transactions -- Efficient electronic cash with restricted privacy -- The SPEED cipher -- Evaluating the security of electronic money -- Electronic cash-technology will denationalise money -- Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective -- Some critical remarks on "dynamic data authentication" as specified in EMV '96 -- Single-chip implementation of a cryptosystem for financial applications -- Perspectives on financial cryptography -- Auditable metering with lightweight security -- SVP: A flexible micropayment scheme -- An efficient micropayment system based on probabilistic polling -- On the continuum between on-line and off-line E-cash systems - I -- Towards multiple-payment schemes for digital money -- Applying anti-trust policies to increase trust in a versatile e-money system -- The uses and limits of financial cryptography: A law professor's perspective -- Legal issues in cryptography -- Digital signatures today -- An Attorney's Roadmap to the Digital Signature Guidelines -- Alternative visions for legal signatures and evidence -- Money laundering: Past, present and future -- Electronic lottery tickets as micropayments -- Strategic tasks for government in the information age -- Using electronic markets to achieve efficient task distribution -- The gateway security model in the Java Electronic Commerce Framework -- Highly scalable on-line payments via task decoupling -- GUMP Grand Unified Meta-Protocols recipes for simple, standards-based financial cryptography -- Secure network communications and secure store & forward mechanisms within the SAP R/3 system.
|
520 |
|
|
|a This book constitutes the strictly refereed post-proceedings of the First International Conference on Financial Cryptography, FC '97, held in Anguilla, BWI, in February 1997. The 31 revised contributions presented were carefully reviewed and revised for inclusion in the book. The book provides a unique synopsis on financial cryptography, taking into account the views and ideas of cryptographers, security experts, computer hackers, lawyers, bankers, journalists and administrative professionals. The papers cover the whole spectrum of the security of financial transactions or digital commerce in general, ranging from pure cryptosystems to the technology of electronic money to legal and regulatory policy issues.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Business.
|
650 |
|
0 |
|a Management science.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
|
0 |
|a Information technology.
|
650 |
|
0 |
|a Business-Data processing.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Theory of Computation.
|0 http://scigraph.springernature.com/things/product-market-codes/I16005
|
650 |
2 |
4 |
|a Business and Management, general.
|0 http://scigraph.springernature.com/things/product-market-codes/500000
|
650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14045
|
650 |
2 |
4 |
|a IT in Business.
|0 http://scigraph.springernature.com/things/product-market-codes/522000
|
700 |
1 |
|
|a Hirschfeld, Rafael.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662172247
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540635949
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 1318
|
856 |
4 |
0 |
|u https://doi.org/10.1007/3-540-63594-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Computer Science (Springer-11645)
|