Financial Cryptography

5th International Conference, FC 2001 Grand Cayman, British West Indies, February 19–22, 2001 Proceedings


ISBN: 978-3-540-44079-6 (Print) 978-3-540-46088-6 (Online)
Download Book (4,035 KB) As a courtesy to our readers the eBook is provided DRM-free. However, please note that Springer uses effective methods and state-of-the art technology to detect, stop, and prosecute illegal sharing to safeguard our authors’ interests.

Table of contents (28 chapters)

previous Page of 2
  1. Managing Payment Transaction Costs

    1. Book Chapter

      Pages 1-20

      Amortized E-Cash

    2. Book Chapter

      Pages 21-40

      Offline Micropayments without Trusted Hardware

  2. Panel (I)

    1. Book Chapter

      Pages 41-50

      The Practical Problems of Implementing MicroMint

    2. Book Chapter

      Pages 51-53

      Protecting Digital Rights

    3. Book Chapter

      Pages 54-58

      Aspects of Digital Rights Management and the Use of Hardware Security Devices

    4. Book Chapter

      Pages 59-63

      A Solution to the Napster Phenomenon: Why Value Cannot Be Created Absent the Transfer of Subjective Data

    5. Book Chapter

      Pages 64-74

      Golden Times for Digital Rights Management?

    6. Book Chapter

      Pages 75-78

      Applicability of Public Key Cryptosystems to Digital Rights Management Applications

  3. Trust and Risk Management

    1. Book Chapter

      Pages 79-90

      On the Global Content PMI: Improved Copy-Protected Internet Content Distribution

    2. Book Chapter

      Pages 91-105

      Trust: A Collision of Paradigms

  4. Groups and Anonymity

    1. Book Chapter

      Pages 106-116

      On the Security of Homage Group Authentication Protocol

    2. Book Chapter

      Pages 117-135

      Anonymity without ‘Cryptography’

    3. Book Chapter

      Pages 136-148

      Fair Tracing without Trustees

  5. Invited Talk

    1. Book Chapter

      Pages 149-155

      Why the War on Money Laundering Should Be Aborted

  6. Certificates and Authentication

    1. Book Chapter

      Pages 156-165

      Provably Secure Implicit Certificate Schemes

    2. Book Chapter

      Pages 166-177

      Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation

    3. Book Chapter

      Pages 178-195

      Mutual Authentication for Low-Power Mobile Devices

  7. Credit Card Security

    1. Book Chapter

      Pages 196-209

      Off-Line Generation of Limited-Use Credit Card Numbers

    2. Book Chapter

      Pages 210-231

      A Security Framework for Card-Based Systems

    3. Book Chapter

      Pages 232-242

      SecureClick: A Web Payment System with Disposable Credit Card Numbers

previous Page of 2