首页 > 最新文献

Handbook of Financial Cryptography and Security最新文献

英文 中文
Auctions 拍卖
Pub Date : 2020-06-30 DOI: 10.1201/9781420059823-c2
F. Brandt
{"title":"Auctions","authors":"F. Brandt","doi":"10.1201/9781420059823-c2","DOIUrl":"https://doi.org/10.1201/9781420059823-c2","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Broadcast and Content Distribution 广播及内容分发
Pub Date : 2010-08-02 DOI: 10.1201/9781420059823-c6
Serdar Pehlivanoglu
{"title":"Broadcast and Content Distribution","authors":"Serdar Pehlivanoglu","doi":"10.1201/9781420059823-c6","DOIUrl":"https://doi.org/10.1201/9781420059823-c6","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116558193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Rights Management 数码版权管理
Pub Date : 2010-08-02 DOI: 10.1201/9781420059823-c8
R. Safavi-Naini, N. Sheppard
Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. Documents are distributed in a protected form such that they may only be used with trusted environments, and only in accordance with terms and conditions stated in the licence. Digital rights management has found uses in protecting copyrighted audio-visual productions, private personal information, and companies' trade secrets and intellectual property. This chapter describes a general model of digital rights management together with the technologies used to implement each component of a digital rights management system, and desribes how digital rights management can be applied to secure the distribution of electronic information in a variety of contexts.
数字版权管理允许信息所有者通过机器可读许可证来控制电子文件的使用和传播。文档以受保护的形式分发,因此它们只能在可信的环境中使用,并且只能按照许可证中规定的条款和条件使用。数字版权管理在保护受版权保护的视听作品、私人信息以及公司的商业秘密和知识产权方面得到了应用。本章描述了数字版权管理的一般模型,以及用于实现数字版权管理系统的每个组件的技术,并描述了如何应用数字版权管理来保护各种环境下电子信息的分发。
{"title":"Digital Rights Management","authors":"R. Safavi-Naini, N. Sheppard","doi":"10.1201/9781420059823-c8","DOIUrl":"https://doi.org/10.1201/9781420059823-c8","url":null,"abstract":"Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. Documents are distributed in a protected form such that they may only be used with trusted environments, and only in accordance with terms and conditions stated in the licence. Digital rights management has found uses in protecting copyrighted audio-visual productions, private personal information, and companies' trade secrets and intellectual property. This chapter describes a general model of digital rights management together with the technologies used to implement each component of a digital rights management system, and desribes how digital rights management can be applied to secure the distribution of electronic information in a variety of contexts.","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125535577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware Security Modules 硬件安全模块
Pub Date : 2010-08-02 DOI: 10.1201/9781420059823-c10
Sean W. Smith
{"title":"Hardware Security Modules","authors":"Sean W. Smith","doi":"10.1201/9781420059823-c10","DOIUrl":"https://doi.org/10.1201/9781420059823-c10","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Legal Issues 法律问题
Pub Date : 2001-01-01 DOI: 10.1201/9781420059823-c18
M. Jackson
{"title":"Legal Issues","authors":"M. Jackson","doi":"10.1201/9781420059823-c18","DOIUrl":"https://doi.org/10.1201/9781420059823-c18","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133670694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Portfolio Trading 投资组合的交易
Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c11
M. Szydlo
{"title":"Portfolio Trading","authors":"M. Szydlo","doi":"10.1201/9781420059823-c11","DOIUrl":"https://doi.org/10.1201/9781420059823-c11","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133762088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Digital Watermarking 数字水印
Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c14
Mauro Barni, Stefan Katzenbeisser
Watermarking is a technique of embedding a secret message in a cover message. When media is watermarked the secret message is usually a copyright notice. Watermarking thus discourages intellectual property theft and helps us to prove ownership when such a theft occurs. This survey paper describes Digital Watermarking in detail and explains theory, techniques and its applications especially to digital libraries.
水印是一种在掩护信息中嵌入秘密信息的技术。当媒体被打上水印时,秘密信息通常是一个版权声明。因此,水印阻止了知识产权盗窃,并帮助我们在盗窃发生时证明所有权。本文详细介绍了数字水印技术的原理、技术及其在数字图书馆中的应用。
{"title":"Digital Watermarking","authors":"Mauro Barni, Stefan Katzenbeisser","doi":"10.1201/9781420059823-c14","DOIUrl":"https://doi.org/10.1201/9781420059823-c14","url":null,"abstract":"Watermarking is a technique of embedding a secret message in a cover message. When media is watermarked the secret message is usually a copyright notice. Watermarking thus discourages intellectual property theft and helps us to prove ownership when such a theft occurs. This survey paper describes Digital Watermarking in detail and explains theory, techniques and its applications especially to digital libraries.","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124984400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Micropayment Systems 小额付款服务系统
Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c7
R. Párhonyi
{"title":"Micropayment Systems","authors":"R. Párhonyi","doi":"10.1201/9781420059823-c7","DOIUrl":"https://doi.org/10.1201/9781420059823-c7","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133456320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Trusted Computing 可信计算
Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c9
A. Sadeghi, C. Wachsmann
{"title":"Trusted Computing","authors":"A. Sadeghi, C. Wachsmann","doi":"10.1201/9781420059823-c9","DOIUrl":"https://doi.org/10.1201/9781420059823-c9","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124584173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Fair Exchange 公平交换
Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c5
M. Dashti, S. Mauw
Fairness is a broad concept, covering a range of qualificatio ns such as impartiality, courtesy, equity, sportsmanship, etc. Here, we focus on fai r ess in exchanging (electronic) goods, stipulating that none of the partners can tak e an undue advantage over the other. When is an interaction between two or more people calle d fair? Let us proceed with a few examples which reflect fairness as it is understood in the security literature. Our examples, as the cryptographic tradition goes, are scen arios involving Alice and Bob. To learn more about these people see [Gor05].
公平是一个宽泛的概念,涵盖了一系列的条件,如公正、礼貌、公平、体育精神等。在这里,我们关注的是交换(电子)商品的公平,规定任何合作伙伴都不能对另一方采取不正当的优势。两个或两个以上的人之间的互动何时被称为公平?让我们举几个例子来反映安全文献中所理解的公平性。按照密码学的传统,我们的例子是涉及Alice和Bob的场景。要了解更多关于这些人的信息,请参见[Gor05]。
{"title":"Fair Exchange","authors":"M. Dashti, S. Mauw","doi":"10.1201/9781420059823-c5","DOIUrl":"https://doi.org/10.1201/9781420059823-c5","url":null,"abstract":"Fairness is a broad concept, covering a range of qualificatio ns such as impartiality, courtesy, equity, sportsmanship, etc. Here, we focus on fai r ess in exchanging (electronic) goods, stipulating that none of the partners can tak e an undue advantage over the other. When is an interaction between two or more people calle d fair? Let us proceed with a few examples which reflect fairness as it is understood in the security literature. Our examples, as the cryptographic tradition goes, are scen arios involving Alice and Bob. To learn more about these people see [Gor05].","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116678521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Handbook of Financial Cryptography and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1