Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers

Author:   Rebecca N. Wright
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2003 ed.
Volume:   2742
ISBN:  

9783540406631


Pages:   328
Publication Date:   29 July 2003
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $184.67 Quantity:  
Add to Cart

Share |

Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers


Add your own review!

Overview

Full Product Details

Author:   Rebecca N. Wright
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2003 ed.
Volume:   2742
Dimensions:   Width: 15.50cm , Height: 1.70cm , Length: 23.50cm
Weight:   1.040kg
ISBN:  

9783540406631


ISBN 10:   3540406638
Pages:   328
Publication Date:   29 July 2003
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Micropayment and E-cash.- Using Trust Management to Support Transferable Hash-Based Micropayments.- A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.- On the Anonymity of Fair Offline E-cash Systems.- Retrofitting Fairness on the Original RSA-Based E-cash.- Panel: Does Anyone Really Need MicroPayments?.- Does Anyone Really Need MicroPayments?.- The Case Against Micropayments.- Security, Anonymity, and Privacy.- On the Economics of Anonymity.- Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.- How Much Security Is Enough to Stop a Thief?.- Attacks.- Cryptanalysis of the OTM Signature Scheme from FC'02.- Man in the Middle Attacks on Bluetooth.- Fault Based Cryptanalysis of the Advanced Encryption Standard (AES).- Panel: Economics of Security.- Economics, Psychology, and Sociology of Security.- Fair Exchange.- Timed Fair Exchange of Standard Signatures.- Asynchronous Optimistic Fair Exchange Based on Revocable Items.- Auctions.- Fully Private Auctions in a Constant Number of Rounds.- Secure Generalized Vickrey Auction Using Homomorphic Encryption.- Panel: Trusted Computing Platforms.- Trusted Computing Platforms: The Good, the Bad, and the Ugly.- On TCPA.- Cryptographic Tools and Primitives.- On The Computation-Storage Trade-Offs of Hash Chain Traversal.- Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures.- Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List