default search action
Handbook of Financial Cryptography and Security 2010
- Burton Rosenberg:
Handbook of Financial Cryptography and Security. Chapman and Hall/CRC 2010, ISBN 978-1-4200-5981-6
Protocols and Theory
- Mira Belenkiy:
E-Cash. 3-48 - Felix Brandt:
Auctions. 49-58 - Aggelos Kiayias:
Electronic Voting. 59-81 - Jianying Zhou:
Non-Repudiation. 83-108 - Mohammad Torabi Dashti, Sjouke Mauw:
Fair Exchange. 109-132 - Serdar Pehlivanoglu:
Broadcast and Content Distribution. 133-159
Systems, Device, Banking, and Commerce
- Róbert Párhonyi:
Micropayment Systems. 163-191 - Reihaneh Safavi-Naini, Nicholas Paul Sheppard:
Digital Rights Management. 193-220 - Ahmad-Reza Sadeghi, Christian Wachsmann:
Trusted Computing. 221-256 - Sean Smith:
Hardware Security Modules. 257-278 - Michael Szydlo:
Portfolio Trading. 279-297
Risk, Threats, Countermeasures, and Trust
- Markus Jakobsson, Sid Stamm, Christopher Soghoian:
Phishing. 301-339 - George Danezis, Claudia Díaz, Paul F. Syverson:
Anonymous Communication. 341-389 - Mauro Barni, Stefan Katzenbeisser:
Digital Watermarking. 391-435 - Robin Wilton:
Identity Management. 437-453 - Carl M. Ellison:
Public Key Infrastructure. 455-493
Perspectives
- Lynne M. Coventry:
Human Factors. 497-519 - Margaret Jackson:
Legal Issues. 521-554 - Radu Sion, Marianne Winslett:
Regulatory Compliance. 555-584
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.