Buch, Englisch, Band 1318, 416 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 1320 g
First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997. Proceedings
Buch, Englisch, Band 1318, 416 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 1320 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-63594-9
Verlag: Springer Berlin Heidelberg
This book constitutes the strictly refereed post-proceedings of the First International Conference on Financial Cryptography, FC '97, held in Anguilla, BWI, in February 1997.
The 31 revised contributions presented were carefully reviewed and revised for inclusion in the book. The book provides a unique synopsis on financial cryptography, taking into account the views and ideas of cryptographers, security experts, computer hackers, lawyers, bankers, journalists and administrative professionals. The papers cover the whole spectrum of the security of financial transactions or digital commerce in general, ranging from pure cryptosystems to the technology of electronic money to legal and regulatory policy issues.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Mathematik | Informatik EDV | Informatik Business Application Unternehmenssoftware SAP
- Mathematik | Informatik EDV | Informatik Betriebssysteme Windows Betriebssysteme
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Mathematik | Informatik Mathematik Numerik und Wissenschaftliches Rechnen Computeranwendungen in der Mathematik
- Mathematik | Informatik Mathematik Numerik und Wissenschaftliches Rechnen Angewandte Mathematik, Mathematische Modelle
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Wirtschaftswissenschaften Betriebswirtschaft Bereichsspezifisches Management E-Commerce, E-Business, E-Marketing
- Mathematik | Informatik EDV | Informatik Informatik
Weitere Infos & Material
Anonymity control in E-cash systems.- How to make personalized web browsing simple, secure, and anonymous.- Anonymous networking and virtual intranets: Tools for anonymous corporations.- Unlinkable serial transactions.- Efficient electronic cash with restricted privacy.- The SPEED cipher.- Evaluating the security of electronic money.- Electronic cash-technology will denationalise money.- Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective.- Some critical remarks on “dynamic data authentication” as specified in EMV '96.- Single-chip implementation of a cryptosystem for financial applications.- Perspectives on financial cryptography.- Auditable metering with lightweight security.- SVP: A flexible micropayment scheme.- An efficient micropayment system based on probabilistic polling.- On the continuum between on-line and off-line E-cash systems — I.- Towards multiple-payment schemes for digital money.- Applying anti-trust policies to increase trust in a versatile e-money system.- The uses and limits of financial cryptography: A law professor's perspective.- Legal issues in cryptography.- Digital signatures today.- An Attorney's Roadmap to the Digital Signature Guidelines.- Alternative visions for legal signatures and evidence.- Money laundering: Past, present and future.- Electronic lottery tickets as micropayments.- Strategic tasks for government in the information age.- Using electronic markets to achieve efficient task distribution.- The gateway security model in the Java Electronic Commerce Framework.- Highly scalable on-line payments via task decoupling.- GUMP Grand Unified Meta-Protocols recipes for simple, standards-based financial cryptography.- Secure network communications and secure store & forward mechanisms withinthe SAP R/3 system.