Pub Date : 2020-06-30DOI: 10.1201/9781420059823-c2
F. Brandt
{"title":"Auctions","authors":"F. Brandt","doi":"10.1201/9781420059823-c2","DOIUrl":"https://doi.org/10.1201/9781420059823-c2","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-08-02DOI: 10.1201/9781420059823-c6
Serdar Pehlivanoglu
{"title":"Broadcast and Content Distribution","authors":"Serdar Pehlivanoglu","doi":"10.1201/9781420059823-c6","DOIUrl":"https://doi.org/10.1201/9781420059823-c6","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116558193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-08-02DOI: 10.1201/9781420059823-c8
R. Safavi-Naini, N. Sheppard
Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. Documents are distributed in a protected form such that they may only be used with trusted environments, and only in accordance with terms and conditions stated in the licence. Digital rights management has found uses in protecting copyrighted audio-visual productions, private personal information, and companies' trade secrets and intellectual property. This chapter describes a general model of digital rights management together with the technologies used to implement each component of a digital rights management system, and desribes how digital rights management can be applied to secure the distribution of electronic information in a variety of contexts.
{"title":"Digital Rights Management","authors":"R. Safavi-Naini, N. Sheppard","doi":"10.1201/9781420059823-c8","DOIUrl":"https://doi.org/10.1201/9781420059823-c8","url":null,"abstract":"Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. Documents are distributed in a protected form such that they may only be used with trusted environments, and only in accordance with terms and conditions stated in the licence. Digital rights management has found uses in protecting copyrighted audio-visual productions, private personal information, and companies' trade secrets and intellectual property. This chapter describes a general model of digital rights management together with the technologies used to implement each component of a digital rights management system, and desribes how digital rights management can be applied to secure the distribution of electronic information in a variety of contexts.","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125535577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-08-02DOI: 10.1201/9781420059823-c10
Sean W. Smith
{"title":"Hardware Security Modules","authors":"Sean W. Smith","doi":"10.1201/9781420059823-c10","DOIUrl":"https://doi.org/10.1201/9781420059823-c10","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-01-01DOI: 10.1201/9781420059823-c18
M. Jackson
{"title":"Legal Issues","authors":"M. Jackson","doi":"10.1201/9781420059823-c18","DOIUrl":"https://doi.org/10.1201/9781420059823-c18","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133670694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1201/9781420059823-c11
M. Szydlo
{"title":"Portfolio Trading","authors":"M. Szydlo","doi":"10.1201/9781420059823-c11","DOIUrl":"https://doi.org/10.1201/9781420059823-c11","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133762088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1201/9781420059823-c14
Mauro Barni, Stefan Katzenbeisser
Watermarking is a technique of embedding a secret message in a cover message. When media is watermarked the secret message is usually a copyright notice. Watermarking thus discourages intellectual property theft and helps us to prove ownership when such a theft occurs. This survey paper describes Digital Watermarking in detail and explains theory, techniques and its applications especially to digital libraries.
{"title":"Digital Watermarking","authors":"Mauro Barni, Stefan Katzenbeisser","doi":"10.1201/9781420059823-c14","DOIUrl":"https://doi.org/10.1201/9781420059823-c14","url":null,"abstract":"Watermarking is a technique of embedding a secret message in a cover message. When media is watermarked the secret message is usually a copyright notice. Watermarking thus discourages intellectual property theft and helps us to prove ownership when such a theft occurs. This survey paper describes Digital Watermarking in detail and explains theory, techniques and its applications especially to digital libraries.","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124984400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1201/9781420059823-c7
R. Párhonyi
{"title":"Micropayment Systems","authors":"R. Párhonyi","doi":"10.1201/9781420059823-c7","DOIUrl":"https://doi.org/10.1201/9781420059823-c7","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133456320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1201/9781420059823-c9
A. Sadeghi, C. Wachsmann
{"title":"Trusted Computing","authors":"A. Sadeghi, C. Wachsmann","doi":"10.1201/9781420059823-c9","DOIUrl":"https://doi.org/10.1201/9781420059823-c9","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124584173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1201/9781420059823-c5
M. Dashti, S. Mauw
Fairness is a broad concept, covering a range of qualificatio ns such as impartiality, courtesy, equity, sportsmanship, etc. Here, we focus on fai r ess in exchanging (electronic) goods, stipulating that none of the partners can tak e an undue advantage over the other. When is an interaction between two or more people calle d fair? Let us proceed with a few examples which reflect fairness as it is understood in the security literature. Our examples, as the cryptographic tradition goes, are scen arios involving Alice and Bob. To learn more about these people see [Gor05].
{"title":"Fair Exchange","authors":"M. Dashti, S. Mauw","doi":"10.1201/9781420059823-c5","DOIUrl":"https://doi.org/10.1201/9781420059823-c5","url":null,"abstract":"Fairness is a broad concept, covering a range of qualificatio ns such as impartiality, courtesy, equity, sportsmanship, etc. Here, we focus on fai r ess in exchanging (electronic) goods, stipulating that none of the partners can tak e an undue advantage over the other. When is an interaction between two or more people calle d fair? Let us proceed with a few examples which reflect fairness as it is understood in the security literature. Our examples, as the cryptographic tradition goes, are scen arios involving Alice and Bob. To learn more about these people see [Gor05].","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116678521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}