Financial Cryptography: 5th International Conference, FC 2001 Grand Cayman, British West Indies, February 19–22, 2001 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Financial Cryptography, FC 2001, held in Grand Cayman, British West Indies, in February 2001.
The 20 revised full papers presented together with various panel statements and one invited paper were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on managing payment transaction costs, trust and risk management, groups and anonymity, certificates and authentication, credit card security, markets and multiparty computation, digital signatures and financial cryptography, and auctions.

Author(s): Moses Liskov, Silvio Micali (auth.), Paul Syverson (eds.)
Series: Lecture Notes in Computer Science 2339
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2002

Language: English
Pages: 379
Tags: Data Encryption; Operating Systems; Management of Computing and Information Systems; Computer Communication Networks; Algorithm Analysis and Problem Complexity; Computers and Society

Amortized E-Cash....Pages 1-20
Offline Micropayments without Trusted Hardware....Pages 21-40
The Practical Problems of Implementing MicroMint....Pages 41-50
Protecting Digital Rights....Pages 51-53
Aspects of Digital Rights Management and the Use of Hardware Security Devices....Pages 54-58
A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data....Pages 59-63
Golden Times for Digital Rights Management?....Pages 64-74
Applicability of Public Key Cryptosystems to Digital Rights Management Applications....Pages 75-78
On the Global Content PMI: Improved Copy-Protected Internet Content Distribution....Pages 79-90
Trust: A Collision of Paradigms....Pages 91-105
On the Security of Homage Group Authentication Protocol....Pages 106-116
Anonymity without ‘Cryptography’....Pages 117-135
Fair Tracing without Trustees....Pages 136-148
Why the War on Money Laundering Should Be Aborted....Pages 149-155
Provably Secure Implicit Certificate Schemes....Pages 156-165
Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation....Pages 166-177
Mutual Authentication for Low-Power Mobile Devices....Pages 178-195
Off-Line Generation of Limited-Use Credit Card Numbers....Pages 196-209
A Security Framework for Card-Based Systems....Pages 210-231
SecureClick: A Web Payment System with Disposable Credit Card Numbers....Pages 232-242
The Business of Electronic Voting....Pages 243-268
Privacy for the Stock Market....Pages 269-288
Secure Distributed Computing in a Commercial Environment....Pages 289-304
Monotone Signatures....Pages 305-318
The Power of RSA Inversion Oracles and the Security of Chaum’s RSA-Based Blind Signature Scheme....Pages 319-338
Optimistic Fair Exchange with Transparent Signature Recovery....Pages 339-350
( M + 1)st-Price Auction Protocol....Pages 351-363
Non-interactive Private Auctions....Pages 364-377