default search action
Search dblp for Publications
export results for "toc:db/reference/crc/fcs2010.bht:"
@book{DBLP:reference/crc/2010fcs, editor = {Burton Rosenberg}, title = {Handbook of Financial Cryptography and Security}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823}, doi = {10.1201/9781420059823}, isbn = {978-1-4200-5981-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/2010fcs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Barni010, author = {Mauro Barni and Stefan Katzenbeisser}, editor = {Burton Rosenberg}, title = {Digital Watermarking}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {391--435}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c14}, doi = {10.1201/9781420059823-C14}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Barni010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Belenkiy10, author = {Mira Belenkiy}, editor = {Burton Rosenberg}, title = {E-Cash}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {3--48}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c1}, doi = {10.1201/9781420059823-C1}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Belenkiy10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Brandt10, author = {Felix Brandt}, editor = {Burton Rosenberg}, title = {Auctions}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {49--58}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c2}, doi = {10.1201/9781420059823-C2}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Brandt10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Coventry10, author = {Lynne M. Coventry}, editor = {Burton Rosenberg}, title = {Human Factors}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {497--519}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c17}, doi = {10.1201/9781420059823-C17}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Coventry10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/DanezisDS10, author = {George Danezis and Claudia D{\'{\i}}az and Paul F. Syverson}, editor = {Burton Rosenberg}, title = {Anonymous Communication}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {341--389}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c13}, doi = {10.1201/9781420059823-C13}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/DanezisDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/DashtiM10, author = {Mohammad Torabi Dashti and Sjouke Mauw}, editor = {Burton Rosenberg}, title = {Fair Exchange}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {109--132}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c5}, doi = {10.1201/9781420059823-C5}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/DashtiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Ellison10, author = {Carl M. Ellison}, editor = {Burton Rosenberg}, title = {Public Key Infrastructure}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {455--493}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c16}, doi = {10.1201/9781420059823-C16}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Ellison10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Jackson10, author = {Margaret Jackson}, editor = {Burton Rosenberg}, title = {Legal Issues}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {521--554}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c18}, doi = {10.1201/9781420059823-C18}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Jackson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/JakobssonSS10, author = {Markus Jakobsson and Sid Stamm and Christopher Soghoian}, editor = {Burton Rosenberg}, title = {Phishing}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {301--339}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c12}, doi = {10.1201/9781420059823-C12}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/JakobssonSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Kiayias10, author = {Aggelos Kiayias}, editor = {Burton Rosenberg}, title = {Electronic Voting}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {59--81}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c3}, doi = {10.1201/9781420059823-C3}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Kiayias10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Parhonyi10, author = {R{\'{o}}bert P{\'{a}}rhonyi}, editor = {Burton Rosenberg}, title = {Micropayment Systems}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {163--191}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c7}, doi = {10.1201/9781420059823-C7}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Parhonyi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Pehlivanoglu10, author = {Serdar Pehlivanoglu}, editor = {Burton Rosenberg}, title = {Broadcast and Content Distribution}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {133--159}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c6}, doi = {10.1201/9781420059823-C6}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Pehlivanoglu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/SadeghiW10, author = {Ahmad{-}Reza Sadeghi and Christian Wachsmann}, editor = {Burton Rosenberg}, title = {Trusted Computing}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {221--256}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c9}, doi = {10.1201/9781420059823-C9}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/SadeghiW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Safavi-NainiS10, author = {Reihaneh Safavi{-}Naini and Nicholas Paul Sheppard}, editor = {Burton Rosenberg}, title = {Digital Rights Management}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {193--220}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c8}, doi = {10.1201/9781420059823-C8}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Safavi-NainiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/SionW10, author = {Radu Sion and Marianne Winslett}, editor = {Burton Rosenberg}, title = {Regulatory Compliance}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {555--584}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c19}, doi = {10.1201/9781420059823-C19}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/SionW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Smith10, author = {Sean Smith}, editor = {Burton Rosenberg}, title = {Hardware Security Modules}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {257--278}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c10}, doi = {10.1201/9781420059823-C10}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Smith10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Szydlo10, author = {Michael Szydlo}, editor = {Burton Rosenberg}, title = {Portfolio Trading}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {279--297}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c11}, doi = {10.1201/9781420059823-C11}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Szydlo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Wilton10, author = {Robin Wilton}, editor = {Burton Rosenberg}, title = {Identity Management}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {437--453}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c15}, doi = {10.1201/9781420059823-C15}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Wilton10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Zhou10, author = {Jianying Zhou}, editor = {Burton Rosenberg}, title = {Non-Repudiation}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {83--108}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c4}, doi = {10.1201/9781420059823-C4}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crc/Zhou10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.