Handbook of Financial Cryptography and Security最新文献

筛选
英文 中文
Auctions 拍卖
Handbook of Financial Cryptography and Security Pub Date : 2020-06-30 DOI: 10.1201/9781420059823-c2
F. Brandt
{"title":"Auctions","authors":"F. Brandt","doi":"10.1201/9781420059823-c2","DOIUrl":"https://doi.org/10.1201/9781420059823-c2","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Broadcast and Content Distribution 广播及内容分发
Handbook of Financial Cryptography and Security Pub Date : 2010-08-02 DOI: 10.1201/9781420059823-c6
Serdar Pehlivanoglu
{"title":"Broadcast and Content Distribution","authors":"Serdar Pehlivanoglu","doi":"10.1201/9781420059823-c6","DOIUrl":"https://doi.org/10.1201/9781420059823-c6","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116558193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Rights Management 数码版权管理
Handbook of Financial Cryptography and Security Pub Date : 2010-08-02 DOI: 10.1201/9781420059823-c8
R. Safavi-Naini, N. Sheppard
{"title":"Digital Rights Management","authors":"R. Safavi-Naini, N. Sheppard","doi":"10.1201/9781420059823-c8","DOIUrl":"https://doi.org/10.1201/9781420059823-c8","url":null,"abstract":"Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. Documents are distributed in a protected form such that they may only be used with trusted environments, and only in accordance with terms and conditions stated in the licence. Digital rights management has found uses in protecting copyrighted audio-visual productions, private personal information, and companies' trade secrets and intellectual property. This chapter describes a general model of digital rights management together with the technologies used to implement each component of a digital rights management system, and desribes how digital rights management can be applied to secure the distribution of electronic information in a variety of contexts.","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125535577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware Security Modules 硬件安全模块
Handbook of Financial Cryptography and Security Pub Date : 2010-08-02 DOI: 10.1201/9781420059823-c10
Sean W. Smith
{"title":"Hardware Security Modules","authors":"Sean W. Smith","doi":"10.1201/9781420059823-c10","DOIUrl":"https://doi.org/10.1201/9781420059823-c10","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Portfolio Trading 投资组合的交易
Handbook of Financial Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c11
M. Szydlo
{"title":"Portfolio Trading","authors":"M. Szydlo","doi":"10.1201/9781420059823-c11","DOIUrl":"https://doi.org/10.1201/9781420059823-c11","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133762088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Digital Watermarking 数字水印
Handbook of Financial Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c14
Mauro Barni, Stefan Katzenbeisser
{"title":"Digital Watermarking","authors":"Mauro Barni, Stefan Katzenbeisser","doi":"10.1201/9781420059823-c14","DOIUrl":"https://doi.org/10.1201/9781420059823-c14","url":null,"abstract":"Watermarking is a technique of embedding a secret message in a cover message. When media is watermarked the secret message is usually a copyright notice. Watermarking thus discourages intellectual property theft and helps us to prove ownership when such a theft occurs. This survey paper describes Digital Watermarking in detail and explains theory, techniques and its applications especially to digital libraries.","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124984400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Micropayment Systems 小额付款服务系统
Handbook of Financial Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c7
R. Párhonyi
{"title":"Micropayment Systems","authors":"R. Párhonyi","doi":"10.1201/9781420059823-c7","DOIUrl":"https://doi.org/10.1201/9781420059823-c7","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133456320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Trusted Computing 可信计算
Handbook of Financial Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c9
A. Sadeghi, C. Wachsmann
{"title":"Trusted Computing","authors":"A. Sadeghi, C. Wachsmann","doi":"10.1201/9781420059823-c9","DOIUrl":"https://doi.org/10.1201/9781420059823-c9","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124584173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Identity Management 身份管理
Handbook of Financial Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c15
R. Wilton
{"title":"Identity Management","authors":"R. Wilton","doi":"10.1201/9781420059823-c15","DOIUrl":"https://doi.org/10.1201/9781420059823-c15","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129952472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Factors 人为因素
Handbook of Financial Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c17
L. Coventry
{"title":"Human Factors","authors":"L. Coventry","doi":"10.1201/9781420059823-c17","DOIUrl":"https://doi.org/10.1201/9781420059823-c17","url":null,"abstract":"This 15 credit interdisciplinary certificate program is designed to prepare students with in-depth knowledge of the capabilities and limitations of people and the application of psychological concepts to the design and safety of products and services; including consumer goods, military products, interactive websites and games, and assistive technologies. This certificate requires that students take introductory psychology as well as the two human factors courses (9 credits). Students will also need to take one additional psychology course (3 credits), and one course (3 credits) outside of their major of study in order to foster the interdisciplinary nature of this certificate.","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 396
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信