Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008273567/catalog> ?p ?o. }
Showing items 1 to 33 of
33
with 100 items per page.
- catalog abstract "The third Financial Cryptography conference was held in February 1999, once again at Anguilla in the British West Indies. The number of attendees continues to increase from year to year, as do the number and quality of the technical submissions. The Program Committee did a great job selecting the technical program. I thank them for all of their eo rt’s. We were helped by a number of outside reviewers, including Mart n Abadi, Gerrit Bleumer, Drew Dean, Anand Desai, Mariusz Jakubowski, Andrew Odlyzko, David Pointcheval, Guillaume Poupard, Zul kar Ramzan, Aleta Ricciardi, Dan Simon, Jessica Staddon, Venkie Venka- san, Avishai Wool, and Francis Zane. I apologize for any omissions. Adi Shamir gave an excellent invited talk that forecast the future of crypt- raphy and electronic commerce. On-line certic ate revocation was the subject of a panel led by Michael Myers, following up on the success of his panel on the same topic at last year’s conference. Joan Feigenbaum moderated a lively panel on fair use, intellectual property, and the information economy, and I thank her for pulling together from that discussion a paper for these proceedings. A s- cessful Rump Session allowed participants to present new results in an informal setting, superbly chaired by Avi Rubin.".
- catalog contributor b11510986.
- catalog contributor b11510987.
- catalog created "1999.".
- catalog date "1999".
- catalog date "1999.".
- catalog dateCopyrighted "1999.".
- catalog description "Electronic Commerce -- Experimenting with Electronic Commerce on the PalmPilot -- Blinding of Credit Card Numbers in the SET Protocol -- Anonymity Control -- Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing -- Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems -- Fraud Management -- Risk Management for E-Cash Systems with Partial Real-Time Audit -- Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash -- Public-Key Certificates -- Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys -- Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance -- Steganography -- Playing ‘Hide and Seek’ with Stored Keys -- On Channel Capacity and Modulation of Watermarks in Digital Still Images -- Content Distribution -- Towards Making Broadcast Encryption Practical -- Conditional Access Concepts and Principles -- Fair Use, Intellectual Property, and the Information Economy -- Anonymity Mechanisms -- Anonymous Authentication of Membership in Dynamic Groups -- Some Open Issues and New Directions in Group Signatures -- Auctions and Markets -- Anonymous Investing: Hiding the Identities of Stockholders -- Fair On-Line Auctions without Special Trusted Parties -- Auctions and Markets -- Cryptosystems Robust against “Dynamic Faults” Meet Enterprise Needs for Organizational “Change Control” -- Improved Magic Ink Signatures Using Hints.".
- catalog description "Includes bibliographical references and index.".
- catalog description "The third Financial Cryptography conference was held in February 1999, once again at Anguilla in the British West Indies. The number of attendees continues to increase from year to year, as do the number and quality of the technical submissions. The Program Committee did a great job selecting the technical program. I thank them for all of their eo rt’s. We were helped by a number of outside reviewers, including Mart n Abadi, Gerrit Bleumer, Drew Dean, Anand Desai, Mariusz Jakubowski, Andrew Odlyzko, David Pointcheval, Guillaume Poupard, Zul kar Ramzan, Aleta Ricciardi, Dan Simon, Jessica Staddon, Venkie Venka- san, Avishai Wool, and Francis Zane. I apologize for any omissions. Adi Shamir gave an excellent invited talk that forecast the future of crypt- raphy and electronic commerce. On-line certic ate revocation was the subject of a panel led by Michael Myers, following up on the success of his panel on the same topic at last year’s conference. Joan Feigenbaum moderated a lively panel on fair use, intellectual property, and the information economy, and I thank her for pulling together from that discussion a paper for these proceedings. A s- cessful Rump Session allowed participants to present new results in an informal setting, superbly chaired by Avi Rubin.".
- catalog extent "viii, 267 p. :".
- catalog identifier "3540663622 (softcover : alk. paper)".
- catalog isPartOf "Lecture notes in computer science, 0302-9743 ; 1648".
- catalog issued "1999".
- catalog issued "1999.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer-Verlag,".
- catalog subject "332.1/0285 21".
- catalog subject "Computer Communication Networks.".
- catalog subject "Computer networks Security measures Congresses.".
- catalog subject "Computer science.".
- catalog subject "Computer software.".
- catalog subject "Data encryption (Computer science) Congresses.".
- catalog subject "Data encryption (Computer science).".
- catalog subject "Electronic commerce Security measures Congresses.".
- catalog subject "Electronic funds transfers Security measures Congresses.".
- catalog subject "HG1710 .F35 1999".
- catalog subject "Information Systems.".
- catalog subject "Internet Security measures Congresses.".
- catalog subject "Management information systems.".
- catalog tableOfContents "Electronic Commerce -- Experimenting with Electronic Commerce on the PalmPilot -- Blinding of Credit Card Numbers in the SET Protocol -- Anonymity Control -- Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing -- Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems -- Fraud Management -- Risk Management for E-Cash Systems with Partial Real-Time Audit -- Assessment of Effectiveness of Counterfeit Transaction Detection Systems for Smart Card Based Electronic Cash -- Public-Key Certificates -- Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys -- Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance -- Steganography -- Playing ‘Hide and Seek’ with Stored Keys -- On Channel Capacity and Modulation of Watermarks in Digital Still Images -- Content Distribution -- Towards Making Broadcast Encryption Practical -- Conditional Access Concepts and Principles -- Fair Use, Intellectual Property, and the Information Economy -- Anonymity Mechanisms -- Anonymous Authentication of Membership in Dynamic Groups -- Some Open Issues and New Directions in Group Signatures -- Auctions and Markets -- Anonymous Investing: Hiding the Identities of Stockholders -- Fair On-Line Auctions without Special Trusted Parties -- Auctions and Markets -- Cryptosystems Robust against “Dynamic Faults” Meet Enterprise Needs for Organizational “Change Control” -- Improved Magic Ink Signatures Using Hints.".
- catalog title "Financial cryptography : Third International Conference, FC '99, Anguilla, British West Indies, February 22-25, 1999 : proceedings / Matthew Franklin (ed.).".
- catalog type "text".