Anonymity control in E-cash systems.- How to make personalized web browsing simple, secure, and anonymous.- Anonymous networking and virtual intranets: Tools for anonymous corporations.- Unlinkable serial transactions.- Efficient electronic cash with restricted privacy.- The SPEED cipher.- Evaluating the security of electronic money.- Electronic cash-technology will denationalise money.- Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective.- Some critical remarks on “dynamic data authentication” as specified in EMV '96.- Single-chip implementation of a cryptosystem for financial applications.- Perspectives on financial cryptography.- Auditable metering with lightweight security.- SVP: A flexible micropayment scheme.- An efficient micropayment system based on probabilistic polling.- On the continuum between on-line and off-line E-cash systems — I.- Towards multiple-payment schemes for digital money.- Applying anti-trust policies to increase trust in a versatile e-money system.- The uses and limits of financial cryptography: A law professor's perspective.- Legal issues in cryptography.- Digital signatures today.- An Attorney's Roadmap to the Digital Signature Guidelines.- Alternative visions for legal signatures and evidence.- Money laundering: Past, present and future.- Electronic lottery tickets as micropayments.- Strategic tasks for government in the information age.- Using electronic markets to achieve efficient task distribution.- The gateway security model in the Java Electronic Commerce Framework.- Highly scalable on-line payments via task decoupling.- GUMP Grand Unified Meta-Protocols recipes for simple, standards-based financial cryptography.- Secure network communications and secure store & forward mechanisms withinthe SAP R/3 system.
Springer Book Archives
Ask a Question About this Product More... |