| 000 | 05857cam a22008174a 4500 | ||
|---|---|---|---|
| 001 | ocn213934272 | ||
| 003 | OCoLC | ||
| 005 | 20250703144310.0 | ||
| 006 | m o d | ||
| 007 | cr |n||||||||| | ||
| 008 | 011010s2001 gw a ob 101 0 eng c | ||
| 040 |
_aCOO _beng _epn _cCOO _dCUT _dWAU _dOCLCQ _dYNG _dOCLCQ _dDKDLA _dOCLCO _dOCLCQ _dOCLCA _dUKMGB _dGW5XE _dOCLCF _dOCLCQ _dOCLCO _dOCLCQ _dOCL _dOCLCO _dOCLCQ _dSHS _dUAB _dESU _dOCLCQ _dTFW _dLEAUB _dOCLCQ _dEUX _dOCLCQ _dUKAHL _dOCLCO _dOCLCQ _dWSU _dOCLCO _dOCLCL |
||
| 015 |
_aGBA167670 _2bnb |
||
| 016 | 7 |
_a962698784 _2DE-101 |
|
| 016 | 7 |
_a007756981 _2Uk |
|
| 019 |
_a648147338 _a769771171 _a1238318519 |
||
| 020 |
_a9783540454724 _q(electronic bk.) |
||
| 020 |
_a3540454721 _q(electronic bk.) |
||
| 020 | _z3540427007 | ||
| 020 | _z9783540427001 | ||
| 024 | 7 |
_a10.1007/3-540-45472-1 _2doi |
|
| 029 | 1 |
_aAU@ _b000051324861 |
|
| 029 | 1 |
_aNZ1 _b15297388 |
|
| 035 |
_a(OCoLC)213934272 _z(OCoLC)648147338 _z(OCoLC)769771171 _z(OCoLC)1238318519 |
||
| 042 | _apcc | ||
| 050 | 4 |
_aHG1710 _b.F35 2000 |
|
| 072 | 7 |
_aURY _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a332.1/0285 _221 |
| 049 | _aMAIN | ||
| 111 | 2 |
_aFC (Conference) _n(4th : _d2000 : _cAnguilla) _924827 |
|
| 245 | 1 | 0 |
_aFinancial cryptography : _b4th International Conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000 : proceedings / _cYair Frankel (ed.). |
| 260 |
_aBerlin ; _aNew York : _bSpringer, _c©2001. |
||
| 300 |
_a1 online resource (xi, 378 pages) : _billustrations |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 | _atext file | ||
| 347 | _bPDF | ||
| 490 | 1 |
_aLecture notes in computer science, _x0302-9743 ; _v1962 |
|
| 504 | _aIncludes bibliographical references and index. | ||
| 520 | _aThis book constitutes the thoroughly refereed post-proceedings of the 4th International Conference on Financial Cryptography, FC 2000, held in Anguilla, British West Indies, in February 2000. The 21 revised full papers presented together with two invited papers and two tool summaries were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on digitial rights management, payment systems, finanical cryptography tools, electronic postcards, abusers of systems, financial cryptopolicies and issues, anonymity, and systems architecture. | ||
| 505 | 0 | _aDigital Rights Management -- Efficient Trace and Revoke Schemes -- Efficient Watermark Detection and Collusion Security -- Invited Lecture (I) -- Towards More Sensible Anti-circumvention Regulations -- Payment Systems -- Self-Escrowed Cash against User Blackmailing -- Blind, Auditable Membership Proofs -- Private Selective Payment Protocols -- Financial Cryptography Tools (I) -- Sharing Decryption in the Context of Voting or Lotteries -- Electronic Postcards -- Postal Revenue Collection in the Digital Age -- Signing on a Postcard -- Panel (I) -- Payment Systems: The Next Generation -- Abuses of Systems -- Non-repudiation in SET: Open Issues -- Statistics and Secret Leakage -- Analysis of Abuse-Free Contract Signing -- Asymmetric Currency Rounding -- Financial Crypto Policies and Issues -- The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel -- Critical Comments on the European Directive on a Common Framework for Electronic Signatures and Certification Service Providers -- A Response to "Can We Eliminate Certificate Revocation Lists?" -- Anonymity -- Self-Scrambling Anonymizers -- Authentic Attributes with Fine-Grained Anonymity Protection -- Resource-Efficient Anonymous Group Identification -- Financial Cryptography Tools (I) -- Secret Key Authentication with Software-Only Verification -- Panel (I) -- Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else? -- System Architectures -- Financial Cryptography in 7 Layers -- Capability-Based Financial Instruments. | |
| 650 | 0 |
_aElectronic funds transfers _xSecurity measures _vCongresses. _916506 |
|
| 650 | 0 |
_aData encryption (Computer science) _vCongresses. _915030 |
|
| 650 | 0 |
_aElectronic commerce _xSecurity measures _vCongresses. _916507 |
|
| 650 | 0 |
_aInternet _xSecurity measures _vCongresses. _916508 |
|
| 650 | 0 |
_aComputer networks _xSecurity measures _vCongresses. _915567 |
|
| 650 | 6 |
_aMonnaie électronique _xSécurité _xMesures _vCongrès. _916509 |
|
| 650 | 6 |
_aChiffrement (Informatique) _vCongrès. _916510 |
|
| 650 | 6 |
_aCommerce électronique _xSécurité _xMesures _vCongrès. _916511 |
|
| 650 | 6 |
_aInternet _xSécurité _xMesures _vCongrès. _916512 |
|
| 650 | 6 |
_aRéseaux d'ordinateurs _xSécurité _xMesures _vCongrès. _916513 |
|
| 650 | 7 |
_aComputer networks _xSecurity measures _2fast |
|
| 650 | 7 |
_aData encryption (Computer science) _2fast _913647 |
|
| 650 | 7 |
_aElectronic commerce _xSecurity measures _2fast _915715 |
|
| 650 | 7 |
_aElectronic funds transfers _xSecurity measures _2fast _916515 |
|
| 650 | 7 |
_aInternet _xSecurity measures _2fast _916516 |
|
| 655 | 4 |
_aOnline resources. _915049 |
|
| 655 | 7 |
_aproceedings (reports) _2aat |
|
| 655 | 7 |
_aConference papers and proceedings _2fast _96065 |
|
| 655 | 7 |
_aConference papers and proceedings. _2lcgft _96065 |
|
| 655 | 7 |
_aActes de congrès. _2rvmgf _9609890 |
|
| 700 | 1 |
_aFrankel, Yair. _917103 |
|
| 758 |
_ihas work: _aFinancial cryptography (Text) _1https://id.oclc.org/worldcat/entity/E39PCYGpTqxwgDYV8Jmkf4mDFX _4https://id.oclc.org/worldcat/ontology/hasWork |
||
| 776 | 0 | 8 |
_iPrint version: _aFC 2000 (2000 : Anguilla). _tFinancial cryptography. _dBerlin ; New York : Springer, ©2001 _z3540427007 _w(OCoLC)48221442 |
| 830 | 0 |
_aLecture notes in computer science ; _v1962. _x0302-9743 |
|
| 856 | 4 | 0 | _uhttps://link.springer.com/10.1007/3-540-45472-1 |
| 938 |
_aAskews and Holts Library Services _bASKH _nAH29653716 |
||
| 994 |
_a92 _bATIST |
||
| 999 |
_c636932 _d636932 |
||