Cantitate/Preț
Produs

Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers: Lecture Notes in Computer Science, cartea 2742

Editat de Rebecca N. Wright
en Limba Engleză Paperback – 29 iul 2003

Din seria Lecture Notes in Computer Science

Preț: 39542 lei

Nou

Puncte Express: 593

Preț estimativ în valută:
7566 7991$ 6297£

Carte tipărită la comandă

Livrare economică 13-27 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540406631
ISBN-10: 3540406638
Pagini: 336
Ilustrații: VIII, 328 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.78 kg
Ediția:2003
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Micropayment and E-cash.- Using Trust Management to Support Transferable Hash-Based Micropayments.- A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.- On the Anonymity of Fair Offline E-cash Systems.- Retrofitting Fairness on the Original RSA-Based E-cash.- Panel: Does Anyone Really Need MicroPayments?.- Does Anyone Really Need MicroPayments?.- The Case Against Micropayments.- Security, Anonymity, and Privacy.- On the Economics of Anonymity.- Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.- How Much Security Is Enough to Stop a Thief?.- Attacks.- Cryptanalysis of the OTM Signature Scheme from FC’02.- “Man in the Middle” Attacks on Bluetooth.- Fault Based Cryptanalysis of the Advanced Encryption Standard (AES).- Panel: Economics of Security.- Economics, Psychology, and Sociology of Security.- Fair Exchange.- Timed Fair Exchange of Standard Signatures.- Asynchronous Optimistic Fair Exchange Based on Revocable Items.- Auctions.- Fully Private Auctions in a Constant Number of Rounds.- Secure Generalized Vickrey Auction Using Homomorphic Encryption.- Panel: Trusted Computing Platforms.- Trusted Computing Platforms: The Good, the Bad, and the Ugly.- On TCPA.- Cryptographic Tools and Primitives.- On The Computation-Storage Trade-Offs of Hash Chain Traversal.- Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures.- Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.