{"title":"Auctions","authors":"F. Brandt","doi":"10.1201/9781420059823-c2","DOIUrl":"https://doi.org/10.1201/9781420059823-c2","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Broadcast and Content Distribution","authors":"Serdar Pehlivanoglu","doi":"10.1201/9781420059823-c6","DOIUrl":"https://doi.org/10.1201/9781420059823-c6","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116558193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Rights Management","authors":"R. Safavi-Naini, N. Sheppard","doi":"10.1201/9781420059823-c8","DOIUrl":"https://doi.org/10.1201/9781420059823-c8","url":null,"abstract":"Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. Documents are distributed in a protected form such that they may only be used with trusted environments, and only in accordance with terms and conditions stated in the licence. Digital rights management has found uses in protecting copyrighted audio-visual productions, private personal information, and companies' trade secrets and intellectual property. This chapter describes a general model of digital rights management together with the technologies used to implement each component of a digital rights management system, and desribes how digital rights management can be applied to secure the distribution of electronic information in a variety of contexts.","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125535577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Security Modules","authors":"Sean W. Smith","doi":"10.1201/9781420059823-c10","DOIUrl":"https://doi.org/10.1201/9781420059823-c10","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115959001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Portfolio Trading","authors":"M. Szydlo","doi":"10.1201/9781420059823-c11","DOIUrl":"https://doi.org/10.1201/9781420059823-c11","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133762088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Watermarking","authors":"Mauro Barni, Stefan Katzenbeisser","doi":"10.1201/9781420059823-c14","DOIUrl":"https://doi.org/10.1201/9781420059823-c14","url":null,"abstract":"Watermarking is a technique of embedding a secret message in a cover message. When media is watermarked the secret message is usually a copyright notice. Watermarking thus discourages intellectual property theft and helps us to prove ownership when such a theft occurs. This survey paper describes Digital Watermarking in detail and explains theory, techniques and its applications especially to digital libraries.","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124984400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Micropayment Systems","authors":"R. Párhonyi","doi":"10.1201/9781420059823-c7","DOIUrl":"https://doi.org/10.1201/9781420059823-c7","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133456320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trusted Computing","authors":"A. Sadeghi, C. Wachsmann","doi":"10.1201/9781420059823-c9","DOIUrl":"https://doi.org/10.1201/9781420059823-c9","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124584173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity Management","authors":"R. Wilton","doi":"10.1201/9781420059823-c15","DOIUrl":"https://doi.org/10.1201/9781420059823-c15","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129952472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Factors","authors":"L. Coventry","doi":"10.1201/9781420059823-c17","DOIUrl":"https://doi.org/10.1201/9781420059823-c17","url":null,"abstract":"This 15 credit interdisciplinary certificate program is designed to prepare students with in-depth knowledge of the capabilities and limitations of people and the application of psychological concepts to the design and safety of products and services; including consumer goods, military products, interactive websites and games, and assistive technologies. This certificate requires that students take introductory psychology as well as the two human factors courses (9 credits). Students will also need to take one additional psychology course (3 credits), and one course (3 credits) outside of their major of study in order to foster the interdisciplinary nature of this certificate.","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}