Pub Date : 1900-01-01DOI: 10.1201/9781420059823-c3
A. Kiayias
{"title":"Electronic Voting","authors":"A. Kiayias","doi":"10.1201/9781420059823-c3","DOIUrl":"https://doi.org/10.1201/9781420059823-c3","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133714575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1201/9781420059823-c15
R. Wilton
{"title":"Identity Management","authors":"R. Wilton","doi":"10.1201/9781420059823-c15","DOIUrl":"https://doi.org/10.1201/9781420059823-c15","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129952472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1201/9781420059823-c17
L. Coventry
This 15 credit interdisciplinary certificate program is designed to prepare students with in-depth knowledge of the capabilities and limitations of people and the application of psychological concepts to the design and safety of products and services; including consumer goods, military products, interactive websites and games, and assistive technologies. This certificate requires that students take introductory psychology as well as the two human factors courses (9 credits). Students will also need to take one additional psychology course (3 credits), and one course (3 credits) outside of their major of study in order to foster the interdisciplinary nature of this certificate.
{"title":"Human Factors","authors":"L. Coventry","doi":"10.1201/9781420059823-c17","DOIUrl":"https://doi.org/10.1201/9781420059823-c17","url":null,"abstract":"This 15 credit interdisciplinary certificate program is designed to prepare students with in-depth knowledge of the capabilities and limitations of people and the application of psychological concepts to the design and safety of products and services; including consumer goods, military products, interactive websites and games, and assistive technologies. This certificate requires that students take introductory psychology as well as the two human factors courses (9 credits). Students will also need to take one additional psychology course (3 credits), and one course (3 credits) outside of their major of study in order to foster the interdisciplinary nature of this certificate.","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1201/9781420059823-c16
C. Ellison
Shared symmetric key but still need reliable way to associate public key with entity...
共享对称密钥,但仍需要可靠的方式将公钥与实体关联…
{"title":"Public Key Infrastructure","authors":"C. Ellison","doi":"10.1201/9781420059823-c16","DOIUrl":"https://doi.org/10.1201/9781420059823-c16","url":null,"abstract":"Shared symmetric key but still need reliable way to associate public key with entity...","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133486086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1201/9781420059823-c4
Jianying Zhou
{"title":"Non-Repudiation","authors":"Jianying Zhou","doi":"10.1201/9781420059823-c4","DOIUrl":"https://doi.org/10.1201/9781420059823-c4","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131278070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}