7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Elsewhere $172 $129 Save $43.00 (25%)
Free shipping Australia wide
Order Now for Christmas with e-Gift
|Format: ||Paperback / softback, 336 pages|
|Published In: ||Germany, 29 July 2003|
This book constitutes the thoroughly refereed postproceedings of the 7th International Conference on Financial Cryptography, FC 2003, held in Guadeloupe, French West Indies, in January 2003.The 17 revised full papers presented together with 5 panel position papers were carefully reviewed and selected from 54 submissions. The papers are organized in topical sections on micropayment and e-cash; security, anonymity, and privacy; attacks; fair exchange; auctions; and cryptographic tools and primitives.
Springer Book Archives
Table of Contents
Micropayment and E-cash.- Using Trust Management to Support Transferable Hash-Based Micropayments.- A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.- On the Anonymity of Fair Offline E-cash Systems.- Retrofitting Fairness on the Original RSA-Based E-cash.- Panel: Does Anyone Really Need MicroPayments?.- Does Anyone Really Need MicroPayments?.- The Case Against Micropayments.- Security, Anonymity, and Privacy.- On the Economics of Anonymity.- Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.- How Much Security Is Enough to Stop a Thief?.- Attacks.- Cryptanalysis of the OTM Signature Scheme from FC'02.- "Man in the Middle" Attacks on Bluetooth.- Fault Based Cryptanalysis of the Advanced Encryption Standard (AES).- Panel: Economics of Security.- Economics, Psychology, and Sociology of Security.- Fair Exchange.- Timed Fair Exchange of Standard Signatures.- Asynchronous Optimistic Fair Exchange Based on Revocable Items.- Auctions.- Fully Private Auctions in a Constant Number of Rounds.- Secure Generalized Vickrey Auction Using Homomorphic Encryption.- Panel: Trusted Computing Platforms.- Trusted Computing Platforms: The Good, the Bad, and the Ugly.- On TCPA.- Cryptographic Tools and Primitives.- On The Computation-Storage Trade-Offs of Hash Chain Traversal.- Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures.- Non-interactive Zero-Sharing with Applications to Private Distributed Decision Making.
Springer-Verlag Berlin and Heidelberg GmbH & Co. K|
23.39 x 15.6 x 1.78 centimetres (0.47 kg)|
15+ years |