Financial Cryptography: 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001. Proceedings

Financial Cryptography: 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2001. Proceedings

by Paul F. Syverson (Editor)


Choose Expedited Shipping at checkout for guaranteed delivery by Wednesday, January 29
5 New & Used Starting at $16.97


This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Financial Cryptography, FC 2001, held in Grand Cayman, British West Indies, in February 2001.
The 20 revised full papers presented together with various panel statements and one invited paper were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on managing payment transaction costs, trust and risk management, groups and anonymity, certificates and authentication, credit card security, markets and multiparty computation, digital signatures and financial cryptography, and auctions.

Product Details

ISBN-13: 9783540440796
Publisher: Springer Berlin Heidelberg
Publication date: 10/03/2002
Series: Lecture Notes in Computer Science , #2339
Edition description: 2002
Pages: 379
Product dimensions: 6.10(w) x 9.25(h) x 0.03(d)

Table of Contents

Managing Payment Transaction Costs.- Amortized E-Cash.- Offline Micropayments without Trusted Hardware.- Panel (I).- The Practical Problems of Implementing MicroMint.- Protecting Digital Rights.- Aspects of Digital Rights Management and the Use of Hardware Security Devices.- A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data.- Golden Times for Digital Rights Management?.- Applicability of Public Key Cryptosystems to Digital Rights Management Applications.- Trust and Risk Management.- On the Global Content PMI: Improved Copy-Protected Internet Content Distribution.- Trust: A Collision of Paradigms.- Groups and Anonymity.- On the Security of Homage Group Authentication Protocol.- Anonymity without ‘Cryptography’.- Fair Tracing without Trustees.- Invited Talk.- Why the War on Money Laundering Should Be Aborted.- Certificates and Authentication.- Provably Secure Implicit Certificate Schemes.- Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation.- Mutual Authentication for Low-Power Mobile Devices.- Credit Card Security.- Off-Line Generation of Limited-Use Credit Card Numbers.- A Security Framework for Card-Based Systems.- SecureClick: A Web Payment System with Disposable Credit Card Numbers.- Panel (II).- The Business of Electronic Voting.- Markets and Multiparty Computation.- Privacy for the Stock Market.- Secure Distributed Computing in a Commercial Environment.- Signatures in Financial Cryptography.- Monotone Signatures.- The Power of RSA Inversion Oracles and the Security of Chaum’s RSA-Based Blind Signature Scheme.- Optimistic Fair Exchange with Transparent Signature Recovery.- Auctions.- (M + 1)st-Price Auction Protocol.- Non-interactive Private Auctions.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews