Financial Cryptography (eBook, PDF)
8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers
Redaktion: Juels, Ari
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Financial Cryptography (eBook, PDF)
8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers
Redaktion: Juels, Ari
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 4.2MB
Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 286
- Erscheinungstermin: 21. September 2004
- Englisch
- ISBN-13: 9783540278092
- Artikelnr.: 53292706
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Ari Juels, RSA Laboratories, Bedford, MA, USA
Invited Talks.- Analyzing the Success and Failure of Recent e-Payment Schemes.- Peppercoin Micropayments.- Loyalty and Micropayment Systems.- Microcredits for Verifiable Foreign Service Provider Metering.- A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves.- User Authentication.- Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop.- Call Center Customer Verification by Query-Directed Passwords.- Invited Talks.- Cryptography and the French Banking Cards: Past, Present, Future.- PayPass Security and Risk.- e-Voting.- The Vector-Ballot e-Voting Approach.- Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast.- Panel Session: Building Usable Security Systems.- Usability and Acceptability of Biometric Security Systems.- Mental Models of Computer Security.- Visualization Tools for Security Administrators.- Secure Interaction Design.- Invited Talk.- Bringing Payment Technology to the Unbanked.- Auctions and Lotteries.- Interleaving Cryptography and Mechanism Design.- Secure Generalized Vickrey Auction without Third-party Servers.- Electronic National Lotteries.- Identity-Based Chameleon Hash and Applications.- Game Theoretic and Cryptographic Tools.- Selecting Correlated Random Actions.- An Efficient and Usable Multi-show Non-transferable Anonymous Credential System.- The Ephemeral Pairing Problem.- Mix Networks and Anonymous Communications.- Mixminion: Strong Anonymity for Financial Cryptography.- Practical Anonymity for the Masses with MorphMix.- Timing Attacks in Low-Latency Mix Systems.- Provable Unlinkability against Traffic Analysis.
Invited Talks.- Analyzing the Success and Failure of Recent e-Payment Schemes.- Peppercoin Micropayments.- Loyalty and Micropayment Systems.- Microcredits for Verifiable Foreign Service Provider Metering.- A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves.- User Authentication.- Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop.- Call Center Customer Verification by Query-Directed Passwords.- Invited Talks.- Cryptography and the French Banking Cards: Past, Present, Future.- PayPass Security and Risk.- e-Voting.- The Vector-Ballot e-Voting Approach.- Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast.- Panel Session: Building Usable Security Systems.- Usability and Acceptability of Biometric Security Systems.- Mental Models of Computer Security.- Visualization Tools for Security Administrators.- Secure Interaction Design.- Invited Talk.- Bringing Payment Technology to the Unbanked.- Auctions and Lotteries.- Interleaving Cryptography and Mechanism Design.- Secure Generalized Vickrey Auction without Third-party Servers.- Electronic National Lotteries.- Identity-Based Chameleon Hash and Applications.- Game Theoretic and Cryptographic Tools.- Selecting Correlated Random Actions.- An Efficient and Usable Multi-show Non-transferable Anonymous Credential System.- The Ephemeral Pairing Problem.- Mix Networks and Anonymous Communications.- Mixminion: Strong Anonymity for Financial Cryptography.- Practical Anonymity for the Masses with MorphMix.- Timing Attacks in Low-Latency Mix Systems.- Provable Unlinkability against Traffic Analysis.