


default search action
Handbook of Financial Cryptography and Security 2010
- Burton Rosenberg:

Handbook of Financial Cryptography and Security. Chapman and Hall/CRC 2010, ISBN 978-1-4200-5981-6
Protocols and Theory
- Mira Belenkiy:

E-Cash. 3-48 - Felix Brandt:

Auctions. 49-58 - Aggelos Kiayias:

Electronic Voting. 59-81 - Jianying Zhou:

Non-Repudiation. 83-108 - Mohammad Torabi Dashti, Sjouke Mauw

:
Fair Exchange. 109-132 - Serdar Pehlivanoglu:

Broadcast and Content Distribution. 133-159
Systems, Device, Banking, and Commerce
- Róbert Párhonyi:

Micropayment Systems. 163-191 - Reihaneh Safavi-Naini, Nicholas Paul Sheppard:

Digital Rights Management. 193-220 - Ahmad-Reza Sadeghi, Christian Wachsmann:

Trusted Computing. 221-256 - Sean Smith:

Hardware Security Modules. 257-278 - Michael Szydlo:

Portfolio Trading. 279-297
Risk, Threats, Countermeasures, and Trust
- Markus Jakobsson, Sid Stamm, Christopher Soghoian:

Phishing. 301-339 - George Danezis, Claudia Díaz, Paul F. Syverson:

Anonymous Communication. 341-389 - Mauro Barni, Stefan Katzenbeisser:

Digital Watermarking. 391-435 - Robin Wilton:

Identity Management. 437-453 - Carl M. Ellison:

Public Key Infrastructure. 455-493
Perspectives
- Lynne M. Coventry:

Human Factors. 497-519 - Margaret Jackson:

Legal Issues. 521-554 - Radu Sion

, Marianne Winslett:
Regulatory Compliance. 555-584

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














