Financial cryptography
Autoren
Parameter
Mehr zum Buch
InhaltsverzeichnisMicropayment and E-cash.Using Trust Management to Support Transferable Hash-Based Micropayments.A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.On the Anonymity of Fair Offline E-cash Systems.Retrofitting Fairness on the Original RSA-Based E-cash.Panel: Does Anyone Really Need MicroPayments?.Does Anyone Really Need MicroPayments?.The Case Against Micropayments.Security, Anonymity, and Privacy.On the Economics of Anonymity.Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.How Much Security Is Enough to Stop a Thief?.Attacks.Cryptanalysis of the OTM Signature Scheme from FC’02.“Man in the Middle” Attacks on Bluetooth.Fault Based Cryptanalysis of the Advanced Encryption Standard (AES).Panel: Economics of Security.Economics, Psychology, and Sociology of Security.Fair Exchange.Timed Fair Exchange of Standard Signatures.Asynchronous Optimistic Fair Exchange Based on Revocable Items.Auctions.Fully Private Auctions in a Constant Number of Rounds.Secure Generalized Vickrey Auction Using Homomorphic Encryption.Panel: Trusted Computing Platforms.Trusted Computing Platforms: The Good, the Bad, and the Ugly.On TCPA.Cryptographic Tools and Primitives.On The Computation-Storage Trade-Offs of Hash Chain Traversal.Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures.Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.
Buchkauf
Financial cryptography, Rebecca N. Wright
- Sprache
- Erscheinungsdatum
- 2003
Lieferung
Zahlungsmethoden
Deine Änderungsvorschläge
- Titel
- Financial cryptography
- Sprache
- Deutsch
- Autor*innen
- Rebecca N. Wright
- Verlag
- Springer
- Erscheinungsdatum
- 2003
- Einband
- Paperback
- ISBN10
- 3540406638
- ISBN13
- 9783540406631
- Reihe
- Lecture notes in computer science
- Kategorie
- Skripten & Universitätslehrbücher
- Beschreibung
- InhaltsverzeichnisMicropayment and E-cash.Using Trust Management to Support Transferable Hash-Based Micropayments.A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.On the Anonymity of Fair Offline E-cash Systems.Retrofitting Fairness on the Original RSA-Based E-cash.Panel: Does Anyone Really Need MicroPayments?.Does Anyone Really Need MicroPayments?.The Case Against Micropayments.Security, Anonymity, and Privacy.On the Economics of Anonymity.Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.How Much Security Is Enough to Stop a Thief?.Attacks.Cryptanalysis of the OTM Signature Scheme from FC’02.“Man in the Middle” Attacks on Bluetooth.Fault Based Cryptanalysis of the Advanced Encryption Standard (AES).Panel: Economics of Security.Economics, Psychology, and Sociology of Security.Fair Exchange.Timed Fair Exchange of Standard Signatures.Asynchronous Optimistic Fair Exchange Based on Revocable Items.Auctions.Fully Private Auctions in a Constant Number of Rounds.Secure Generalized Vickrey Auction Using Homomorphic Encryption.Panel: Trusted Computing Platforms.Trusted Computing Platforms: The Good, the Bad, and the Ugly.On TCPA.Cryptographic Tools and Primitives.On The Computation-Storage Trade-Offs of Hash Chain Traversal.Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures.Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.