Financial Cryptography
Editat de Rebecca N. Wrighten Limba Engleză Paperback – 29 iul 2003
Preț: 377.22 lei
Nou
Puncte Express: 566
Preț estimativ în valută:
66.75€ • 78.27$ • 58.62£
66.75€ • 78.27$ • 58.62£
Carte tipărită la comandă
Livrare economică 06-20 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540406631
ISBN-10: 3540406638
Pagini: 336
Ilustrații: VIII, 328 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.51 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540406638
Pagini: 336
Ilustrații: VIII, 328 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.51 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Micropayment and E-cash.- Using Trust Management to Support Transferable Hash-Based Micropayments.- A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.- On the Anonymity of Fair Offline E-cash Systems.- Retrofitting Fairness on the Original RSA-Based E-cash.- Panel: Does Anyone Really Need MicroPayments?.- Does Anyone Really Need MicroPayments?.- The Case Against Micropayments.- Security, Anonymity, and Privacy.- On the Economics of Anonymity.- Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.- How Much Security Is Enough to Stop a Thief?.- Attacks.- Cryptanalysis of the OTM Signature Scheme from FC’02.- “Man in the Middle” Attacks on Bluetooth.- Fault Based Cryptanalysis of the Advanced Encryption Standard (AES).- Panel: Economics of Security.- Economics, Psychology, and Sociology of Security.- Fair Exchange.- Timed Fair Exchange of Standard Signatures.- Asynchronous Optimistic Fair Exchange Based on Revocable Items.- Auctions.- Fully Private Auctions in a Constant Number of Rounds.- Secure Generalized Vickrey Auction Using Homomorphic Encryption.- Panel: Trusted Computing Platforms.- Trusted Computing Platforms: The Good, the Bad, and the Ugly.- On TCPA.- Cryptographic Tools and Primitives.- On The Computation-Storage Trade-Offs of Hash Chain Traversal.- Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures.- Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.