Financial cryptography : 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001 : proceedings /

Saved in:
Bibliographic Details
Meeting name:FC (Conference) (5th : 2001 : Grand Cayman Island, Cayman Islands)
Imprint:Berlin ; New York : Springer, ©2002.
Description:1 online resource (ix, 377 pages) : illustrations.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 2339
Lecture notes in computer science ; 2339.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11065001
Hidden Bibliographic Details
Other authors / contributors:Syverson, Paul F.
ISBN:9783540460886
3540460888
3540440798
9783540440796
Notes:Includes bibliographical references and index.
Summary:This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Financial Cryptography, FC 2001, held in Grand Cayman, British West Indies, in February 2001. The 20 revised full papers presented together with various panel statements and one invited paper were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on managing payment transaction costs, trust and risk management, groups and anonymity, certificates and authentication, credit card security, markets and multiparty computation, digital signatures and financial cryptography, and auctions.
Other form:Print version: FC 2001 (2001 : Grand Cayman Island, Cayman Islands). Financial cryptography. Berlin ; New York : Springer, ©2002 3540440798 9783540440796
Table of Contents:
  • Managing Payment Transaction Costs
  • Amortized E-Cash
  • Offline Micropayments without Trusted Hardware
  • Panel (I)
  • The Practical Problems of Implementing MicroMint
  • Protecting Digital Rights
  • Aspects of Digital Rights Management and the Use of Hardware Security Devices
  • A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data
  • Golden Times for Digital Rights Management?
  • Applicability of Public Key Cryptosystems to Digital Rights Management Applications
  • Trust and Risk Management
  • On the Global Content PMI: Improved Copy-Protected Internet Content Distribution
  • Trust: A Collision of Paradigms
  • Groups and Anonymity
  • On the Security of Homage Group Authentication Protocol
  • Anonymity without 'Cryptography'
  • Fair Tracing without Trustees
  • Invited Talk
  • Why the War on Money Laundering Should Be Aborted
  • Certificates and Authentication
  • Provably Secure Implicit Certificate Schemes
  • Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation
  • Mutual Authentication for Low-Power Mobile Devices
  • Credit Card Security
  • Off-Line Generation of Limited-Use Credit Card Numbers
  • A Security Framework for Card-Based Systems
  • SecureClick: A Web Payment System with Disposable Credit Card Numbers
  • Panel (II)
  • The Business of Electronic Voting
  • Markets and Multiparty Computation
  • Privacy for the Stock Market
  • Secure Distributed Computing in a Commercial Environment
  • Signatures in Financial Cryptography
  • Monotone Signatures
  • The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme
  • Optimistic Fair Exchange with Transparent Signature Recovery
  • Auctions
  • (M + 1)st-Price Auction Protocol
  • Non-interactive Private Auctions.