- Pub. Date:
- Springer Berlin Heidelberg
This book constitutes the strictly refereed post-proceedings of the First International Conference on Financial Cryptography, FC '97, held in Anguilla, BWI, in February 1997.
The 31 revised contributions presented were carefully reviewed and revised for inclusion in the book. The book provides a unique synopsis on financial cryptography, taking into account the views and ideas of cryptographers, security experts, computer hackers, lawyers, bankers, journalists and administrative professionals. The papers cover the whole spectrum of the security of financial transactions or digital commerce in general, ranging from pure cryptosystems to the technology of electronic money to legal and regulatory policy issues.
|Publisher:||Springer Berlin Heidelberg|
|Series:||Lecture Notes in Computer Science Series , #1318|
|Product dimensions:||6.10(w) x 9.25(h) x 0.03(d)|
Table of Contents
Anonymity control in E-cash systems.- How to make personalized web browsing simple, secure, and anonymous.- Anonymous networking and virtual intranets: Tools for anonymous corporations.- Unlinkable serial transactions.- Efficient electronic cash with restricted privacy.- The SPEED cipher.- Evaluating the security of electronic money.- Electronic cash-technology will denationalise money.- Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective.- Some critical remarks on “dynamic data authentication” as specified in EMV '96.- Single-chip implementation of a cryptosystem for financial applications.- Perspectives on financial cryptography.- Auditable metering with lightweight security.- SVP: A flexible micropayment scheme.- An efficient micropayment system based on probabilistic polling.- On the continuum between on-line and off-line E-cash systems — I.- Towards multiple-payment schemes for digital money.- Applying anti-trust policies to increase trust in a versatile e-money system.- The uses and limits of financial cryptography: A law professor's perspective.- Legal issues in cryptography.- Digital signatures today.- An Attorney's Roadmap to the Digital Signature Guidelines.- Alternative visions for legal signatures and evidence.- Money laundering: Past, present and future.- Electronic lottery tickets as micropayments.- Strategic tasks for government in the information age.- Using electronic markets to achieve efficient task distribution.- The gateway security model in the Java Electronic Commerce Framework.- Highly scalable on-line payments via task decoupling.- GUMP Grand Unified Meta-Prools recipes for simple, standards-based financial cryptography.- Secure network communications and secure store & forward mechanisms within the SAP R/3 system.