000 04673nam a22005775i 4500
001 978-3-540-36504-4
003 DE-He213
005 20160624101935.0
007 cr nn 008mamaa
008 121227s2003 gw | s |||| 0|eng d
020 _a9783540365044
_9978-3-540-36504-4
024 7 _a10.1007/3-540-36504-4
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
245 1 0 _aFinancial Cryptography
_h[electronic resource] :
_b6th International Conference, FC 2002 Southampton, Bermuda, March 2002 Revised Papers /
_cedited by Matt Blaze.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2003.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2003.
300 _aVIII, 302 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v2357
505 0 _aE-voting without ‘Cryptography’ -- An Implementation of a Universally Verifiable Electronic Voting Scheme Based on Shuffling -- Financial Instruments in Recommendation Mechanisms -- Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing -- A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root -- A Two-Server, Sealed-Bid Auction Protocol -- Secure Vickrey Auctions without Threshold Trust -- Almost Optimal Hash Sequence Traversal -- Cryptographic Primitives Enforcing Communication and Storage Complexity -- CryptoComputing with Rationals -- Privacy Tradeoffs: Myth or Reality? -- An Improved Fast Signature Scheme without Online Multiplication -- Timed Release of Standard Digital Signatures -- Quasi-Efficient Revocation of Group Signatures -- The Dark Side of Threshold Cryptography -- Split-and-Delegate: Threshold Cryptography for the Masses -- Redistribution of Mechanical Secret Shares -- Reliable MIX Cascade Networks through Reputation -- Offline Payments with Auditable Tracing -- Fileteller: Paying and Getting Paid for File Storage.
520 _aThe Sixth International Financial Cryptography Conference was held during March 11-14, 2002, in Southampton, Bermuda. As is customary at FC, these proceedings represent "final" versions of the papers presented, revised to take into account comments and discussions from the conference. Submissions to the conference were strong, with 74 papers submitted and 19 accepted for presentation and publication. (Regrettably, three of the submit­ ted papers had to be summarily rejected after it was discovered that they had been improperly submitted in parallel to other conferences.) The small program committee worked very hard under a tight schedule (working through Christmas day) to select the program. No program chair could ask for a better committee; my thanks to everyone for their hard work and dedication. In addition to the refereed papers, the program included a welcome from the Minister of Telecommunications and e-Commerce, Renee Webb, a keynote address by Nigel Hickson, and a panel on privacy tradeoffs cheiired by Rebecca Wright (with panelists Ian Goldberg, Ron Rivest, and Graham Wood). The traditional Tuesday evening "rump session" was skillfully officiated by Markus Jakobsson. My job as program chair was made much, much easier by the excellent work of our general chair, Nicko van Someren, who performed the miracle of hiding from me any evidence of the innumerable logistical nightmares associated with conducting this conference. I have no idea how he did it, but it must have involved many sleepless nights.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aOperating systems (Computers).
650 0 _aData encryption (Computer science).
650 0 _aInformation Systems.
650 0 _aElectronic commerce.
650 0 _aBanks and banking.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aComputer Communication Networks.
650 2 4 _aOperating Systems.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aElectronic Commerce/e-business.
650 2 4 _aFinance /Banking.
700 1 _aBlaze, Matt.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540006466
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v2357
856 4 0 _uhttp://dx.doi.org/10.1007/3-540-36504-4
942 _2EBK4302
_cEBK
999 _c33596
_d33596